ZyXEL G-1000 v2 User’s Guide

Figure 82 Windows XP: Start Menu .......................................................................

141

Figure 83 Windows XP: Control Panel ...................................................................

141

Figure 84 Windows XP: Control Panel: Network Connections: Properties ............

142

Figure 85 Windows XP: Local Area Connection Properties ...................................

142

Figure 86 Windows XP: Advanced TCP/IP Settings ..............................................

143

Figure 87 Windows XP: Internet Protocol (TCP/IP) Properties ..............................

144

Figure 88 Macintosh OS 8/9: Apple Menu .............................................................

145

Figure 89 Macintosh OS 8/9: TCP/IP .....................................................................

145

Figure 90 Macintosh OS X: Apple Menu ................................................................

146

Figure 91 Macintosh OS X: Network ......................................................................

147

Figure 92 IP Address Conflicts: CaseA ..................................................................

149

Figure 93 IP Address Conflicts: Case B ................................................................

149

Figure 94 IP Address Conflicts: Case C .................................................................

150

Figure 95 IP Address Conflicts: Case D .................................................................

151

Figure 96 IBSS (Ad-hoc) Wireless LAN .................................................................

168

Figure 97 Basic Service Set ...................................................................................

169

Figure 98 Extended Service Set ............................................................................

170

Figure 99 RTS/CTS ...............................................................................................

170

Figure 100 WEP Authentication Steps ...................................................................

177

Figure 101 WPA with RADIUS Application Example ..............................................

180

Figure 102 Sequences for EAP MD5–Challenge Authentication ...........................

182

Figure 103 Sequences for PEAP, MS–CHAP V2 Authentication ...........................

183

List of Figures

19