| ZyAIR G-200 User’s Guide |
| List of Figures |
Figure 1-1 Windows XP: System Tray Icon ................................................................................................ | 1-1 |
Figure 1-2 Windows XP: System Tray Icon ................................................................................................ | 1-1 |
Figure 1-3 Windows XP: Wireless Network Connection Status.................................................................. | 1-2 |
Figure 1-4 Windows XP: Connect to Wireless Network ............................................................................. | 1-2 |
Figure 1-5 Windows XP: Wireless Network Connection Properties ........................................................... | 1-3 |
Figure 1-6 ZyAIR Utility: System Tray Icon .............................................................................................. | 1-3 |
Figure 2-1 Ad-hoc Network Example ......................................................................................................... | 2-1 |
Figure 2-2 BSS Example ............................................................................................................................. | 2-2 |
Figure 2-3 Infrastructure Network Example................................................................................................ | 2-2 |
Figure 2-4 Roaming Example...................................................................................................................... | 2-3 |
Figure 2-5 ZyAIR Utility: Link Info ........................................................................................................... | 2-3 |
Figure 2-6 Site Survey................................................................................................................................. | 2-5 |
Figure 2-7 Configuration............................................................................................................................. | 2-6 |
Figure 2-8 ZyAIR Wireless Security Levels ............................................................................................... | 2-7 |
Figure 2-9 WEP Authentication Steps ......................................................................................................... | 2-9 |
Figure 2-10 WEP Authentication............................................................................................................... | 2-10 |
Figure 2-11 WPA Authentication............................................................................................................... | 2-12 |
Figure 2-12 WPA - PSK Authentication.................................................................................................... | 2-14 |
Figure 2-13 WPA with RADIUS Application Example............................................................................. | 2-15 |
Figure 2-14 WPA-PSK Authentication...................................................................................................... | 2-15 |
Figure 2-15 802.1x Authentication............................................................................................................ | 2-17 |
Figure 2-16 About ..................................................................................................................................... | 2-18 |
Figure 3-1 Confirm Uninstallation .............................................................................................................. | 3-1 |
Figure 3-2 ZyAIR Utility: Exit.................................................................................................................... | 3-2 |
Figure 3-3 Removable Device System Tray Icon: Windows XP................................................................. | 3-2 |
Figure 3-4 Safely Remove Hardware: Windows XP ................................................................................... | 3-2 |
Figure 3-5 Problem Ejecting Message: Windows XP ................................................................................. | 3-2 |
Figure 3-6 Stop a Hardware device: Windows XP ...................................................................................... | 3-3 |
Figure 3-7 Safe To Remove Hardware Message: Windows XP .................................................................. | 3-3 |