List of figures – ZyXEL Communications G-162 User Manual
Page 11
ZyXEL G-162 User’s Guide
List of Figures
xi
List of Figures
Figure 1-1 ZyXEL Utility: System Tray Icon ..............................................................................................1-2
Figure 2-1 IBSS Example ............................................................................................................................2-2
Figure 2-2 BSS Example..............................................................................................................................2-2
Figure 2-3 Infrastructure Network Example ................................................................................................2-3
Figure 2-4 Roaming Example ......................................................................................................................2-4
Figure 2-5 Wireless LAN Security Levels ...................................................................................................2-4
Figure 2-6
WPA-PSK Authentication ..........................................................................................................2-7
Figure 2-7 WPA with RADIUS Application Example .................................................................................2-8
Figure 2-8 RTS Threshold............................................................................................................................2-9
Figure 3-1 Link Info.....................................................................................................................................3-1
Figure 3-2 Link Info: Trend Chart ...............................................................................................................3-3
Figure 3-3 Site Survey .................................................................................................................................3-4
Figure 3-4 Site Survey: Security Settings: WEP..........................................................................................3-6
Figure 3-5 Site Survey: Security Settings: WPA-PSK .................................................................................3-8
Figure 3-6 Site Survey: Security Settings: WPA..........................................................................................3-9
Figure 3-7 Site Survey: Security Settings: 802.1x .....................................................................................3-11
Figure 3-8 Profile.......................................................................................................................................3-13
Figure 3-9 Profile: Add New Profile..........................................................................................................3-15
Figure 3-10 Profile: Select a Channel ........................................................................................................3-17
Figure 3-11 Profile: Wireless Settings........................................................................................................3-18
Figure 3-12 Profile: Security Settings........................................................................................................3-19
Figure 3-13 Profile: Confirm New Settings ...............................................................................................3-20
Figure 3-14 Profile: Activate the Profile ....................................................................................................3-21
Figure 3-15 Adapter ...................................................................................................................................3-22
Figure 4-1 About ..........................................................................................................................................4-1
Figure 4-2 Confirm Uninstall.......................................................................................................................4-2