beautypg.com

List of figures – ZyXEL Communications G-162 User Manual

Page 11

background image

ZyXEL G-162 User’s Guide

List of Figures

xi

List of Figures

Figure 1-1 ZyXEL Utility: System Tray Icon ..............................................................................................1-2

Figure 2-1 IBSS Example ............................................................................................................................2-2

Figure 2-2 BSS Example..............................................................................................................................2-2

Figure 2-3 Infrastructure Network Example ................................................................................................2-3

Figure 2-4 Roaming Example ......................................................................................................................2-4

Figure 2-5 Wireless LAN Security Levels ...................................................................................................2-4

Figure 2-6

WPA-PSK Authentication ..........................................................................................................2-7

Figure 2-7 WPA with RADIUS Application Example .................................................................................2-8

Figure 2-8 RTS Threshold............................................................................................................................2-9

Figure 3-1 Link Info.....................................................................................................................................3-1

Figure 3-2 Link Info: Trend Chart ...............................................................................................................3-3

Figure 3-3 Site Survey .................................................................................................................................3-4

Figure 3-4 Site Survey: Security Settings: WEP..........................................................................................3-6

Figure 3-5 Site Survey: Security Settings: WPA-PSK .................................................................................3-8

Figure 3-6 Site Survey: Security Settings: WPA..........................................................................................3-9

Figure 3-7 Site Survey: Security Settings: 802.1x .....................................................................................3-11

Figure 3-8 Profile.......................................................................................................................................3-13

Figure 3-9 Profile: Add New Profile..........................................................................................................3-15

Figure 3-10 Profile: Select a Channel ........................................................................................................3-17

Figure 3-11 Profile: Wireless Settings........................................................................................................3-18

Figure 3-12 Profile: Security Settings........................................................................................................3-19

Figure 3-13 Profile: Confirm New Settings ...............................................................................................3-20

Figure 3-14 Profile: Activate the Profile ....................................................................................................3-21

Figure 3-15 Adapter ...................................................................................................................................3-22

Figure 4-1 About ..........................................................................................................................................4-1

Figure 4-2 Confirm Uninstall.......................................................................................................................4-2