|
| ZyAIR |
|
|
| Table |
|
|
|
|
|
| FIELD | DESCRIPTION |
|
|
|
|
|
| Signal | This field displays the signal strength of each wireless device in percentage. |
|
|
|
|
|
| Channel | This field displays the channel number used by each wireless device. |
|
|
|
|
|
| Security | This field shows whether the wireless security is activated (WEP, |
|
|
| 802.1x) or inactive (None). |
|
| BSS Type | This field displays the wireless network type (Infra or Ad Hoc) of the wireless device. Infra |
|
|
| denotes the infrastructure mode. |
|
|
|
|
|
| Mode | This field displays the wireless standard (802.11b or 802.11g) of the wireless device. |
|
|
|
|
|
| BSSID | This field displays the MAC address of the wireless device. |
|
|
|
|
|
| Refresh | Click Refresh to scan for available wireless device(s) within transmission range. |
|
|
|
|
|
| Connect | Click Connect to associate to the selected wireless device. |
|
|
|
|
|
2.7.1 Connecting to a Network
Follow the steps below to connect to a network using the Site Survey screen. Step 1. Click Search to scan for all available wireless networks within range.
Step 2. To join a network, either click an entry in the table to select a wireless network and then click Connect or
Step 3. If the Security field is activated for the selected wireless network, you must also set the related fields in the Security Configuration screen to the same security settings. Refer to Section 2.9 for more information.
Step 4. Verify that you have successfully connected to the selected network and check the network information in the Link Info screen.
2.8About Wireless LAN Security
Wireless LAN security is vital to your network to protect wireless communication between wireless stations and the wired network.
The figure below shows the possible wireless security levels on your ZyAIR. EAP (Extensible Authentication Protocol) is used for authentication and utilizes dynamic WEP key exchange. It requires interaction with a RADIUS (Remote Authentication
Using the ZyAIR Utility |