ZyXEL G-1000 v2 User’s Guide
Figure 82 Windows XP: Start Menu .......................................................................
141
Figure 83 Windows XP: Control Panel ...................................................................
Figure 84 Windows XP: Control Panel: Network Connections: Properties ............
142
Figure 85 Windows XP: Local Area Connection Properties ...................................
Figure 86 Windows XP: Advanced TCP/IP Settings ..............................................
143
Figure 87 Windows XP: Internet Protocol (TCP/IP) Properties ..............................
144
Figure 88 Macintosh OS 8/9: Apple Menu .............................................................
145
Figure 89 Macintosh OS 8/9: TCP/IP .....................................................................
Figure 90 Macintosh OS X: Apple Menu ................................................................
146
Figure 91 Macintosh OS X: Network ......................................................................
147
Figure 92 IP Address Conflicts: CaseA ..................................................................
149
Figure 93 IP Address Conflicts: Case B ................................................................
Figure 94 IP Address Conflicts: Case C .................................................................
150
Figure 95 IP Address Conflicts: Case D .................................................................
151
Figure 96 IBSS (Ad-hoc) Wireless LAN .................................................................
168
Figure 97 Basic Service Set ...................................................................................
169
Figure 98 Extended Service Set ............................................................................
170
Figure 99 RTS/CTS ...............................................................................................
Figure 100 WEP Authentication Steps ...................................................................
177
Figure 101 WPA with RADIUS Application Example ..............................................
180
Figure 102 Sequences for EAP MD5–Challenge Authentication ...........................
182
Figure 103 Sequences for PEAP, MS–CHAP V2 Authentication ...........................
183
List of Figures
19