List Of Figures - ZyXEL Communications ZyAIR G-405 User Manual

802.11g wireless ethernet adapter
Hide thumbs Also See for ZyAIR G-405:
Table of Contents

Advertisement

ZyAIR G-405 User's Guide

List of Figures

Figure 2-1 Ad-hoc Network Example ..........................................................................................................2-2
Figure 2-2 BSS Example..............................................................................................................................2-2
Figure 2-3 Infrastructure Network Example ................................................................................................2-3
Figure 2-4 Roaming Example ......................................................................................................................2-3
Figure 2-5 RTS Threshold............................................................................................................................2-4
Figure 3-1 Navigator: Main screen ..............................................................................................................3-1
Figure 3-2 Navigator: Connect.....................................................................................................................3-2
Figure 3-3 Navigator: Edit ...........................................................................................................................3-3
Figure 3-4 Navigator: Set IP ........................................................................................................................3-4
Figure 3-5 Navigator: About ........................................................................................................................3-5
Figure 3-6 Confirm Uninstallation...............................................................................................................3-6
Figure 4-1 Web Configurator: Login Screen................................................................................................4-1
Figure 4-2 Web Configurator: Information ..................................................................................................4-3
Figure 4-3 Web Configurator: Change Administrator Login Password .......................................................4-4
Figure 4-4 Web Configurator: Information ..................................................................................................4-5
Figure 4-5 Web Configurator: Information: Site Survey..............................................................................4-7
Figure 5-1 Web Configurator: Setup: Basic Wireless ..................................................................................5-2
Figure 5-2 Web Configurator: Setup: MAC Clone ......................................................................................5-4
Figure 6-1 Wireless LAN Security Levels ...................................................................................................6-1
Figure 6-2 WPA - PSK Authentication.........................................................................................................6-4
Figure 6-3 WPA with RADIUS Application Example .................................................................................6-5
Figure 6-4 Web Configurator: Security........................................................................................................6-6
Figure 6-5 Security: Set Security Settings: WEP .........................................................................................6-7
Figure 6-6 Security: Set Security Settings: IEEE802.1x: MD5 ...................................................................6-9
Figure 6-7 Security: Set Security Settings: IEEE802.1x: TLS...................................................................6-11
Figure 6-8 Security: Set Security Settings: IEEE802.1x: TTLS ................................................................6-13
Figure 6-9 Security: Set Security Settings: WPA: TLS..............................................................................6-15
Figure 6-10 Security: Set Security Settings: WPA: TTLS .........................................................................6-17
Figure 6-11 Security: Set Security Settings: WPA-PSK ............................................................................6-18
Figure 6-12 Security: Set Security Settings: Log Table .............................................................................6-19
Figure 7-1 Web Configurator: Administration .............................................................................................7-2
Figure 7-2 Web Configurator: Administration: Adapter Name ....................................................................7-3
Figure 7-3 Web Configurator: Administration: IP Settings ..........................................................................7-3
Figure 7-4 Web Configurator: Administration: Password............................................................................7-4
Figure 7-5 Web Configurator: Administration: Reset to Factory Defaults...................................................7-5
Figure 7-6 Reset to Factory Defaults: Confirm Screen ................................................................................7-5
List of Figures
xiii

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents