beautypg.com

Igures – Allied Telesis AT-WNU300N User Manual

Page 7

background image

AT-WNU300N IEEE802.11b/g/n 2T2R Wireless Fast USB Adapter User Manual

7

F

IGURES

Figure 1: Product View ..................................................................................................................................................... 11

Figure 2: Starting the Installation.................................................................................................................................... 13

Figure 3: Completing the Installation ............................................................................................................................ 13

Figure 4: Plugging in the Product.................................................................................................................................... 13

Figure 5: Installing Driver ................................................................................................................................................. 14

Figure 6: Completing the Installation ............................................................................................................................ 14

Figure 7: Device Manager................................................................................................................................................. 14

Figure 8: Properties of Device ........................................................................................................................................ 15

Figure 9: Wireless Utility.................................................................................................................................................. 15

Figure 10: Control Panel .................................................................................................................................................. 16

Figure 11: Network and Sharing Center...................................................................................................................... 16

Figure 12: Wireless Connection Status ........................................................................................................................ 17

Figure 13: Internet Protocol version 4 (TCP/IPv4) ................................................................................................... 17

Figure 14: Internet Protocol Version 4 (TCP/IPv4) Properties ............................................................................. 17

Figure 15: Wireless Network Connection Properties ............................................................................................. 18

Figure 16: Internet Protocol (TCP/IP) .......................................................................................................................... 18

Figure 17: Internet Protocol (TCP/IP) Properties ..................................................................................................... 18

Figure 18: The First View of AT-WNU300N Wireless Utility .............................................................................. 19

Figure 19: Select a Network............................................................................................................................................ 20

Figure 20: Configure Profile............................................................................................................................................. 20

Figure 21: Configure Auth./Encry................................................................................................................................... 21

Figure 22: Active an Un-secured Network ................................................................................................................. 21

Figure 23: Select a Network............................................................................................................................................ 21

Figure 24: Configure Profile............................................................................................................................................. 22

Figure 25: Configure Auth./Encry.Chin......................................................................................................................... 22

Figure 26: Active a WEP Network ................................................................................................................................ 22

Figure 27: Select a Network............................................................................................................................................ 23

Figure 28: Configure Profile............................................................................................................................................. 23

Figure 29: Configure Auth./Encry................................................................................................................................... 23

Figure 30: Active a WPA-PSK/WPA2-PSK Network ............................................................................................... 23

Figure 31: Config Utility.................................................................................................................................................... 24

Figure 32: Configure Profile Name................................................................................................................................ 24

Figure 33: Configure Auth./Encry................................................................................................................................... 25

Figure 34: Active a Non-broadcasting Network........................................................................................................ 25

Figure 35: Select a Non-broadcasting SSID ................................................................................................................. 25

Figure 36: Configure Profile Name................................................................................................................................ 26

Figure 37: Configure Auth./Encry................................................................................................................................... 26