ZyXEL G-260 User’s Guide
Figure 21 Profile: Security Setting: Encryption Type
4The screen varies depending on the encryption method you select in the previous screen. The settings must be exactly the same on the APs or other peer wireless computers as they are on the ZyXEL G-260. Refer to Section 3.2.2 on page 37 for detailed information on wireless security configuration.
Figure 22 Profile: Security Setting
5This read-only screen shows a summary of the new profile settings. Verify that the settings are correct. Click Save to save and go to the next screen. Click Back to return to the previous screen. Otherwise, click Exit to go back to the Profile screen without saving.
Chapter 3 ZyXEL Utility Configuration | 46 |