ZyXEL Communications NWD-270N Network Card User Manual


 
NWD-270N User’s Guide
29
CHAPTER 3
ZyXEL Utility - Mac OS X
3.1 Overview
This chapter shows you how to use the ZyXEL utility to configure your NWD-270N using the
Macintosh operating system, Mac OS X.
3.1.1 What You Can Do in This Chapter
•The Profile screen (Section 3.3 on page 31) lets you create, delete and manage your
wireless network profiles.
•The Link Status screen (Section 3.6 on page 35) lets you see your current connection
details, monitor signal strength and quality, and more.
•The Site Survey screen (Section 3.7 on page 36) lets you connect to any available
unsecured wireless network in range of the NWD-270N, or open the security settings
screen for any secured wireless network in range.
•The Statistics screen (Section 3.8 on page 37) lets you view network traffic statistics
between the NWD-270N and the AP or peer to which it is connected.
•The Advanced screen (Section 3.9 on page 39) lets you configure your NWD-270N with
advanced hardware options.
•The WPS screen (Section 3.10 on page 40) lets you configure your NWD-270N’s Wi-Fi
Protected Setup (WPS) options as well as establish and manage WPS connections.
•The About screen (Section 3.11 on page 44) lets you view the information about which
version of the driver and utility you are currently using.
3.1.2 What You Need to Know
The following terms and concepts may help as you read through this chapter.
Wired Equivalent Privacy (WEP)
Although one of the original wireless encryption protocols, WEP is also the weakest. Many
people use it strictly to deter unintentional usage of their wireless network by outsiders.
Wi-Fi Protected Access (WPA)
The WPA protocol affords users with vastly stronger security than WEP. It comes in two
different varieties: WPA and WPA2. Always try to use WPA2 as it implements the full version
of the security standard and WPA does not.