ZyXEL Communications ZyXEL ZyAIR G-220F User Manual page 9

802.11g wireless usb 2.0 adapter
Hide thumbs Also See for ZyXEL ZyAIR G-220F:
Table of Contents

Advertisement

ZyXEL G-220F User's Guide
2.3 Authentication Type ............................................................................................30
2.4 Preamble Type ...................................................................................................30
Chapter 3
Wireless Station Mode Configuration .................................................................. 34
3.1 Wireless Station Mode Overview ......................................................................34
3.2 The Link Info Screen ..........................................................................................34
3.3 The Site Survey Screen .....................................................................................36
3.4 The Profile Screen .............................................................................................43
3.5 The Adapter Screen ...........................................................................................48
Chapter 4
Access Point Mode Configuration........................................................................ 50
4.1 Access Point Mode Introduction ........................................................................50
4.2 The Link Info Screen .........................................................................................50
4.3 The Configuration Screen .................................................................................51
4.4 The MAC Filter Screen ......................................................................................53
Maintenance ........................................................................................................... 56
5.1 The About Screen .............................................................................................56
9
2.2.2 IEEE 802.1x ..............................................................................................27
2.2.2.1 EAP Authentication .........................................................................27
2.2.3 WPA(2) .....................................................................................................28
2.2.3.1 User Authentication .........................................................................28
2.2.3.2 Encryption .......................................................................................28
2.2.4 WPA(2)-PSK Application Example ...........................................................29
2.2.5 WPA with RADIUS Application Example ..................................................29
2.5.1 Enabling OTIST ........................................................................................31
2.5.1.1 AP ...................................................................................................31
2.5.1.2 Wireless Client ................................................................................32
2.5.2 Starting OTIST .........................................................................................32
2.5.3 Notes on OTIST ........................................................................................33
3.2.1 Trend Chart ...............................................................................................35
3.3.1 Connecting to a WLAN Network ...............................................................37
3.3.2 Security Settings .......................................................................................38
3.3.2.1 WEP Encryption ..............................................................................38
3.3.2.2 WPA-PSK ........................................................................................39
3.3.2.3 WPA-RADIUS ..................................................................................40
3.3.2.4 RADIUS ...........................................................................................42
3.4.1 Adding a New Profile ................................................................................44
4.1.1 Additional Setup Requirements ................................................................50
.....................................................................................31
Table of Contents

Advertisement

Table of Contents
loading

Table of Contents