ZyXEL G-570S User's Guide
Chapter 3
Status Screens ....................................................................................................... 47
System Screen ....................................................................................................... 53
5.1 TCP/IP Parameters ............................................................................................53
Wireless Screens ................................................................................................... 57
6.2 Wireless LAN Basics ..........................................................................................59
6.5 WEP Overview ...................................................................................................75
6.6 802.1x Overview ................................................................................................76
10
3.3.3.1 Disable ............................................................................................39
3.3.3.2 WEP ................................................................................................40
3.3.3.3 WPA(2)-PSK ....................................................................................41
3.4.1 Navigation Panel .......................................................................................44
6.1.1 IBSS ..........................................................................................................57
6.1.2 BSS ...........................................................................................................57
6.1.3 ESS ...........................................................................................................58
6.2.1 Channel ....................................................................................................59
6.2.2 SSID .........................................................................................................59
6.2.3 RTS/CTS .................................................................................................60
6.4.1 Encryption .................................................................................................74
6.4.2 Authentication ...........................................................................................74
6.5.1 Data Encryption .......................................................................................75
6.5.2 Authentication ...........................................................................................75
Table of Contents