| ZyXEL G-162 User’s Guide |
| List of Figures |
Figure 1-1 Windows XP: System Tray Icon................................................................................................. | 1-2 |
Figure 1-2 Windows XP: Wireless Network Connection Status .................................................................. | 1-3 |
Figure 1-3 Windows XP: Connect to Wireless Network.............................................................................. | 1-4 |
Figure 1-4 Windows XP: Wireless Network Connection Properties............................................................ | 1-5 |
Figure 1-5 ZyXEL Utility: System Tray Icon .............................................................................................. | 1-5 |
Figure 2-1 IBSS Example ............................................................................................................................ | 2-2 |
Figure 2-2 BSS Example.............................................................................................................................. | 2-3 |
Figure 2-3 Infrastructure Network Example ................................................................................................ | 2-3 |
Figure 2-4 Roaming Example ...................................................................................................................... | 2-4 |
Figure 2-5 Wireless LAN Security Levels ................................................................................................... | 2-5 |
Figure 2-6 WPA-PSK Authentication .......................................................................................................... | 2-7 |
Figure 2-7 WPA with RADIUS Application Example ................................................................................. | 2-8 |
Figure 2-8 RTS Threshold............................................................................................................................ | 2-9 |
Figure 3-1 Link Info..................................................................................................................................... | 3-1 |
Figure 3-2 Link Info: Trend Chart ............................................................................................................... | 3-3 |
Figure 3-3 Site Survey ................................................................................................................................. | 3-4 |
Figure 3-4 Site Survey: Security Settings: WEP.......................................................................................... | 3-6 |
Figure 3-5 Site Survey: Security Settings: WPA-PSK ................................................................................. | 3-8 |
Figure 3-6 Site Survey: Security Settings: WPA.......................................................................................... | 3-9 |
Figure 3-7 Site Survey: Security Settings: 802.1x ..................................................................................... | 3-11 |
Figure 3-8 Profile....................................................................................................................................... | 3-13 |
Figure 3-9 Profile: Add New Profile.......................................................................................................... | 3-15 |
Figure 3-10 Profile: Select a Channel ........................................................................................................ | 3-17 |
Figure 3-11 Profile: Wireless Settings........................................................................................................ | 3-18 |
Figure 3-12 Profile: Security Settings........................................................................................................ | 3-19 |
Figure 3-13 Profile: Confirm New Settings ............................................................................................... | 3-20 |
Figure 3-14 Profile: Activate the Profile .................................................................................................... | 3-21 |
Figure 3-15 Adapter ................................................................................................................................... | 3-22 |
Figure 4-1 About .......................................................................................................................................... | 4-1 |
Figure 4-2 Confirm Uninstall....................................................................................................................... | 4-2 |