ZyXEL G-162 User’s Guide

 

List of Figures

Figure 1-1 Windows XP: System Tray Icon.................................................................................................

1-2

Figure 1-2 Windows XP: Wireless Network Connection Status ..................................................................

1-3

Figure 1-3 Windows XP: Connect to Wireless Network..............................................................................

1-4

Figure 1-4 Windows XP: Wireless Network Connection Properties............................................................

1-5

Figure 1-5 ZyXEL Utility: System Tray Icon ..............................................................................................

1-5

Figure 2-1 IBSS Example ............................................................................................................................

2-2

Figure 2-2 BSS Example..............................................................................................................................

2-3

Figure 2-3 Infrastructure Network Example ................................................................................................

2-3

Figure 2-4 Roaming Example ......................................................................................................................

2-4

Figure 2-5 Wireless LAN Security Levels ...................................................................................................

2-5

Figure 2-6 WPA-PSK Authentication ..........................................................................................................

2-7

Figure 2-7 WPA with RADIUS Application Example .................................................................................

2-8

Figure 2-8 RTS Threshold............................................................................................................................

2-9

Figure 3-1 Link Info.....................................................................................................................................

3-1

Figure 3-2 Link Info: Trend Chart ...............................................................................................................

3-3

Figure 3-3 Site Survey .................................................................................................................................

3-4

Figure 3-4 Site Survey: Security Settings: WEP..........................................................................................

3-6

Figure 3-5 Site Survey: Security Settings: WPA-PSK .................................................................................

3-8

Figure 3-6 Site Survey: Security Settings: WPA..........................................................................................

3-9

Figure 3-7 Site Survey: Security Settings: 802.1x .....................................................................................

3-11

Figure 3-8 Profile.......................................................................................................................................

3-13

Figure 3-9 Profile: Add New Profile..........................................................................................................

3-15

Figure 3-10 Profile: Select a Channel ........................................................................................................

3-17

Figure 3-11 Profile: Wireless Settings........................................................................................................

3-18

Figure 3-12 Profile: Security Settings........................................................................................................

3-19

Figure 3-13 Profile: Confirm New Settings ...............................................................................................

3-20

Figure 3-14 Profile: Activate the Profile ....................................................................................................

3-21

Figure 3-15 Adapter ...................................................................................................................................

3-22

Figure 4-1 About ..........................................................................................................................................

4-1

Figure 4-2 Confirm Uninstall.......................................................................................................................

4-2

List of Figures

xi