ZyXEL Communications G-162 User Manual

Page of 65
 
 
ZyXEL G-162 User’s Guide 
List of Figures 
 
xi 
List of Figures 
Figure 1-1 Windows XP: System Tray Icon.................................................................................................1-2
 
Figure 1-2 Windows XP: Wireless Network Connection Status ..................................................................1-3
 
Figure 1-3 Windows XP: Connect to Wireless Network..............................................................................1-4
 
Figure 1-4 Windows XP: Wireless Network Connection Properties............................................................1-5
 
Figure 1-5 ZyXEL Utility: System Tray Icon ..............................................................................................1-5
 
Figure 2-1 IBSS Example ............................................................................................................................2-2
 
Figure 2-2 BSS Example..............................................................................................................................2-3
 
Figure 2-3 Infrastructure Network Example ................................................................................................2-3
 
Figure 2-4 Roaming Example ......................................................................................................................2-4
 
Figure 2-5 Wireless LAN Security Levels ...................................................................................................2-5
 
Figure 2-6
 
WPA-PSK Authentication ..........................................................................................................2-7
 
Figure 2-7 WPA with RADIUS Application Example .................................................................................2-8
 
Figure 2-8 RTS Threshold............................................................................................................................2-9
 
Figure 3-1 Link Info.....................................................................................................................................3-1
 
Figure 3-2 Link Info: Trend Chart ...............................................................................................................3-3
 
Figure 3-3 Site Survey .................................................................................................................................3-4
 
Figure 3-4 Site Survey: Security Settings: WEP..........................................................................................3-6
 
Figure 3-5 Site Survey: Security Settings: WPA-PSK .................................................................................3-8
 
Figure 3-6 Site Survey: Security Settings: WPA..........................................................................................3-9
 
Figure 3-7 Site Survey: Security Settings: 802.1x .....................................................................................3-11
 
Figure 3-8 Profile.......................................................................................................................................3-13
 
Figure 3-9 Profile: Add New Profile..........................................................................................................3-15
 
Figure 3-10 Profile: Select a Channel ........................................................................................................3-17
 
Figure 3-11 Profile: Wireless Settings........................................................................................................3-18
 
Figure 3-12 Profile: Security Settings........................................................................................................3-19
 
Figure 3-13 Profile: Confirm New Settings ...............................................................................................3-20
 
Figure 3-14 Profile: Activate the Profile ....................................................................................................3-21
 
Figure 3-15 Adapter ...................................................................................................................................3-22
 
Figure 4-1 About ..........................................................................................................................................4-1
 
Figure 4-2 Confirm Uninstall.......................................................................................................................4-2