| ZyAIR G-160 User’s Guide |
| List of Figures |
Figure 1-1 Windows XP: System Tray Icon................................................................................................. | 1-2 |
Figure 1-2 Windows XP: Wireless Network Connection Status .................................................................. | 1-2 |
Figure 1-3 Windows XP: Connect to Wireless Network.............................................................................. | 1-3 |
Figure 1-4 Windows XP: Wireless Network Connection Properties............................................................ | 1-4 |
Figure 1-5 ZyAIR Utility: System Tray Icon ............................................................................................... | 1-4 |
Figure 2-1 Ad-hoc Network Example .......................................................................................................... | 2-2 |
Figure 2-2 BSS Example.............................................................................................................................. | 2-2 |
Figure 2-3 Infrastructure Network Example ................................................................................................ | 2-3 |
Figure 2-4 Roaming Example ...................................................................................................................... | 2-4 |
Figure 2-5 RTS Threshold............................................................................................................................ | 2-5 |
Figure 2-6 Wireless LAN Security Levels ................................................................................................... | 2-6 |
Figure 2-7 WPA - PSK Authentication......................................................................................................... | 2-9 |
Figure 2-8 WPA with RADIUS Application Example ............................................................................... | 2-10 |
Figure 2-9 Main ......................................................................................................................................... | 2-11 |
Figure 2-10 Main: New Connection........................................................................................................... | 2-13 |
Figure 2-11 Main: Advanced...................................................................................................................... | 2-16 |
Figure 2-12 Advanced................................................................................................................................ | 2-17 |
Figure 2-13 Privacy.................................................................................................................................... | 2-19 |
Figure 2-14 WEP Configuration ................................................................................................................ | 2-21 |
Figure 2-15 802.1X Configuration............................................................................................................. | 2-23 |
Figure 2-16 PSK Configuration ................................................................................................................. | 2-25 |
Figure 2-17 Statistics ................................................................................................................................. | 2-26 |
Figure 2-18 About ...................................................................................................................................... | 2-28 |
Figure 3-1 Confirm Uninstallation............................................................................................................... | 3-1 |