ZyXEL G-160 User Guide - Page 11

List of s

Page 11 highlights

ZyAIR G-160 User's Guide List of Figures Figure 1-1 Windows XP: System Tray Icon 1-2 Figure 1-2 Windows XP: Wireless Network Connection Status 1-2 Figure 1-3 Windows XP: Connect to Wireless Network 1-3 Figure 1-4 Windows XP: Wireless Network Connection Properties 1-4 Figure 1-5 ZyAIR Utility: System Tray Icon 1-4 Figure 2-1 Ad-hoc Network Example ...2-2 Figure 2-2 BSS Example...2-2 Figure 2-3 Infrastructure Network Example 2-3 Figure 2-4 Roaming Example ...2-4 Figure 2-5 RTS Threshold...2-5 Figure 2-6 Wireless LAN Security Levels 2-6 Figure 2-7 WPA - PSK Authentication...2-9 Figure 2-8 WPA with RADIUS Application Example 2-10 Figure 2-9 Main ...2-11 Figure 2-10 Main: New Connection...2-13 Figure 2-11 Main: Advanced...2-16 Figure 2-12 Advanced...2-17 Figure 2-13 Privacy...2-19 Figure 2-14 WEP Configuration ...2-21 Figure 2-15 802.1X Configuration...2-23 Figure 2-16 PSK Configuration ...2-25 Figure 2-17 Statistics ...2-26 Figure 2-18 About ...2-28 Figure 3-1 Confirm Uninstallation...3-1 List of Figures xi

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59

ZyAIR G-160 User’s Guide
List of Figures
xi
List of Figures
Figure 1-1 Windows XP: System Tray Icon
.................................................................................................
1-2
Figure 1-2 Windows XP: Wireless Network Connection Status
..................................................................
1-2
Figure 1-3 Windows XP: Connect to Wireless Network
..............................................................................
1-3
Figure 1-4 Windows XP: Wireless Network Connection Properties
............................................................
1-4
Figure 1-5 ZyAIR Utility: System Tray Icon
...............................................................................................
1-4
Figure 2-1 Ad-hoc Network Example
..........................................................................................................
2-2
Figure 2-2 BSS Example
..............................................................................................................................
2-2
Figure 2-3 Infrastructure Network Example
................................................................................................
2-3
Figure 2-4 Roaming Example
......................................................................................................................
2-4
Figure 2-5 RTS Threshold
............................................................................................................................
2-5
Figure 2-6 Wireless LAN Security Levels
...................................................................................................
2-6
Figure 2-7
WPA - PSK Authentication
.........................................................................................................
2-9
Figure 2-8 WPA with RADIUS Application Example
...............................................................................
2-10
Figure 2-9 Main
.........................................................................................................................................
2-11
Figure 2-10 Main: New Connection
...........................................................................................................
2-13
Figure 2-11 Main: Advanced
......................................................................................................................
2-16
Figure 2-12 Advanced
................................................................................................................................
2-17
Figure 2-13 Privacy
....................................................................................................................................
2-19
Figure 2-14 WEP Configuration
................................................................................................................
2-21
Figure 2-15 802.1X Configuration
.............................................................................................................
2-23
Figure 2-16 PSK Configuration
.................................................................................................................
2-25
Figure 2-17 Statistics
.................................................................................................................................
2-26
Figure 2-18 About
......................................................................................................................................
2-28
Figure 3-1 Confirm Uninstallation
...............................................................................................................
3-1