ZyXEL NWD-211AN User Guide - Page 29

ZyXEL Utility, 3.1 Overview, 3.1.1 What You Can Do in This What You Need to Know

Page 29 highlights

CHAPTER 3 ZyXEL Utility 3.1 Overview This chapter shows you how to use the ZyXEL utility to configure your NWD211AN using the Macintosh operating system, Mac OS X. 3.1.1 What You Can Do in This Chapter • The Profile screen (Section 3.3 on page 31) lets you create, delete and manage your wireless network profiles. • The Link Status screen (Section 3.6 on page 36) lets you see your current connection details, monitor signal strength and quality, and more. • The Site Survey screen (Section 3.7 on page 37) lets you connect to any available unsecured wireless network in range of the NWD-211AN, or open the security settings screen for any secured wireless network in range. • The Statistics screen (Section 3.8 on page 39) lets you view network traffic statistics between the NWD-211AN and the AP or peer to which it is connected. • The Advanced screen (Section 3.9 on page 41) lets you configure your NWD211AN with advanced hardware options. • The WPS screen (Section 3.10 on page 42) lets you configure your NWD211AN's Wi-Fi Protected Setup (WPS) options as well as establish and manage WPS connections. • The About screen (Section 3.11 on page 46) lets you view the information about which version of the driver and utility you are currently using. 3.1.2 What You Need to Know The following terms and concepts may help as you read through this chapter. Wired Equivalent Privacy (WEP) Although one of the original wireless encryption protocols, WEP is also the weakest. Many people use it strictly to deter unintentional usage of their wireless network by outsiders. NWD-211AN User's Guide 29

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112

NWD-211AN User’s Guide
29
C
HAPTER
3
ZyXEL Utility
3.1
Overview
This chapter shows you how to use the ZyXEL utility to configure your NWD-
211AN using the Macintosh operating system, Mac OS X.
3.1.1
What You Can Do in This Chapter
• The
Profile
screen (
Section 3.3 on page 31
) lets you create, delete and manage
your wireless network profiles.
• The
Link Status
screen (
Section 3.6 on page 36
) lets you see your current
connection details, monitor signal strength and quality, and more.
• The
Site Survey
screen (
Section 3.7 on page 37
) lets you connect to any
available unsecured wireless network in range of the NWD-211AN, or open the
security settings screen for any secured wireless network in range.
• The
Statistics
screen (
Section 3.8 on page 39
) lets you view network traffic
statistics between the NWD-211AN and the AP or peer to which it is connected.
• The
Advanced
screen (
Section 3.9 on page 41
) lets you configure your NWD-
211AN with advanced hardware options.
• The
WPS
screen (
Section 3.10 on page 42
) lets you configure your NWD-
211AN’s Wi-Fi Protected Setup (WPS) options as well as establish and manage
WPS connections.
• The
About
screen (
Section 3.11 on page 46
) lets you view the information
about which version of the driver and utility you are currently using.
3.1.2
What You Need to Know
The following terms and concepts may help as you read through this chapter.
Wired Equivalent Privacy (WEP)
Although one of the original wireless encryption protocols, WEP is also the
weakest. Many people use it strictly to deter unintentional usage of their wireless
network by outsiders.