Справочник ПользователяСодержаниеUser’s Guide1Copyright3Certifications4Safety Warnings6ZyXEL Limited Warranty7Customer Support8Table of Contents11List of Figures15List of Tables17Preface19Getting Started211.1 About Your AG-220211.2 Application Overview211.2.1 Station Mode211.2.2 Access Point Mode221.2.3 Changing AG-220 Mode231.3 AG-220 Hardware and Utility Installation231.3.1 ZyXEL Utility Icon241.4 Configuration Methods241.4.1 Enabling WZC241.4.2 Accessing the ZyXEL Utility25Tutorial272.1 Connecting to a Wireless LAN272.2 Creating and Using a Profile292.3 Configuring the AG-220 as an AP32Wireless LAN Network353.1 Wireless LAN Overview353.2 Wireless LAN Security363.2.1 Hide SSID363.2.2 MAC Address Filter363.2.3 User Authentication and Encryption373.3 Introduction to OTIST393.3.1 Enabling OTIST393.3.2 Starting OTIST403.3.3 Notes on OTIST41Wireless Station Mode Configuration434.1 Wireless Station Mode Overview434.1.1 ZyXEL Utility Screen Summary434.2 The Link Info Screen444.2.1 Trend Chart454.3 The Site Survey Screen464.3.1 Security Settings474.3.2 Confirm Save Screen514.4 The Profile Screen524.4.1 Adding a New Profile544.5 The Advanced Screen584.6 The Adapter Screen59Access Point Mode Configuration615.1 Access Point Mode Introduction615.1.1 ZyXEL Utility Screen Summary615.1.2 Additional Setup Requirements625.2 The Link Info Screen625.3 The Configuration Screen635.4 The Advanced Screen655.5 The MAC Filter Screen66Maintenance696.1 The About Screen696.2 Uninstalling the ZyXEL Utility696.3 Upgrading the ZyXEL Utility70Troubleshooting717.1 Problems Starting the ZyXEL Utility717.2 Problem Connecting to an Access Point717.3 Problem with the Link Quality727.4 Problems Communicating With Other Computers72Product Specifications73Access Point Mode Setup Example75Configuring the Computer on Which You Install the AG-22075Configuring the Wireless Station Computer77Management with Wireless Zero Configuration79Activating Wireless Zero Configuration79Connecting to a Wireless Network80Security Settings83Association83Authentication85Ordering the Preferred Networks88Wireless Security91Types of EAP Authentication91EAP-MD5 (Message-Digest Algorithm 5)91EAP-TLS (Transport Layer Security)92EAP-TTLS (Tunneled Transport Layer Service)92PEAP (Protected EAP)92LEAP92Dynamic WEP Key Exchange92WPA and WPA293Encryption93User Authentication94WPA(2)-PSK Application Example95WPA(2) with RADIUS Application Example95Security Parameters Summary96Setting up Your Computer’s IP Address97Windows 98/Me97Installing Components98Configuring99Verifying Settings100Windows 2000/XP100Verifying Settings104Index105A105B105C105D105E105F106G106H106I106L106M106N106O106P106Q107R107S107T107U107V107W108Z108Размер: 3,1 МБСтраницы: 108Язык: EnglishПросмотреть