ZyXEL N220 User Guide - Page 49

Station Mode, 4.1 Overview, 4.1.1 What You Can Do in This What You Need to Know

Page 49 highlights

CHAPTER 4 Station Mode 4.1 Overview This section shows you how to configure your N220 using the ZyXEL utility in Windows. Note: Some features available in Windows XP or Windows 2000 are not available in Windows Vista. 4.1.1 What You Can Do in This Section • On the Link Info screen, you can see your current connection details, monitor signal strength and quality, and more. See Section 4.3 on page 51 for details. • On the Site Survey screen, you can connect to any available unsecured wireless network in range of the N220, or open the security settings screen for any secured wireless network in range. See Section 4.4 on page 54 for details. • On the Profile screen, you can create, delete and manage your wireless network profiles. See Section 4.5 on page 62 for details. • On the Adapter screen, you can configure the N220 hardware, such as activating WPS mode or its power saving feature. See Section 4.6 on page 68 for details. 4.1.2 What You Need to Know The following terms and concepts may help as you read through this section. Wired Equivalent Privacy (WEP) WEP (Wired Equivalent Privacy) encrypts data transmitted between wired and wireless networks to keep the transmission private. Although one of the original wireless encryption protocols, WEP is also the weakest. Many people use it strictly to deter unintentional usage of their wireless network by outsiders. Wi-fi Protected Access (WPA) Wi-Fi Protected Access (WPA) is a subset of the IEEE 802.11i standard. It improves data encryption by using Temporal Key Integrity Protocol (TKIP), N220 User's Guide 49

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187

N220 User’s Guide
49
C
HAPTER
4
Station Mode
4.1
Overview
This section shows you how to configure your N220 using the ZyXEL utility in
Windows.
Note: Some features available in Windows XP or Windows 2000 are not available in
Windows Vista.
4.1.1
What You Can Do in This Section
On the
Link Info
screen, you can see your current connection details, monitor
signal strength and quality, and more. See
Section 4.3 on page 51
for details.
On the
Site Survey
screen, you can connect to any available unsecured
wireless network in range of the N220, or open the security settings screen for
any secured wireless network in range. See
Section 4.4 on page 54
for details.
On the
Profile
screen, you can create, delete and manage your wireless
network profiles. See
Section 4.5 on page 62
for details.
On the
Adapter
screen, you can configure the N220 hardware, such as
activating WPS mode or its power saving feature. See
Section 4.6 on page 68
for details.
4.1.2
What You Need to Know
The following terms and concepts may help as you read through this section.
Wired Equivalent Privacy (WEP)
WEP (Wired Equivalent Privacy) encrypts data transmitted between wired and
wireless networks to keep the transmission private. Although one of the original
wireless encryption protocols, WEP is also the weakest. Many people use it strictly
to deter unintentional usage of their wireless network by outsiders.
Wi-fi Protected Access (WPA)
Wi-Fi Protected Access (WPA) is a subset of the IEEE 802.11i standard. It
improves data encryption by using Temporal Key Integrity Protocol (TKIP),