ZyXEL Communications NXC-8160 User Manual page 18

Business wlan controller
Hide thumbs Also See for NXC-8160:
Table of Contents

Advertisement

List of Figures
Figure 125 Opera 9: Install authority certificate ................................................................................... 154
Figure 126 Opera 9: Install authority certificate ................................................................................... 154
Figure 127 Opera 9: Tools Menu .......................................................................................................... 155
Figure 128 Opera 9: Preferences ......................................................................................................... 155
Figure 129 Opera 9: Certificate manager ............................................................................................ 156
Figure 130 Konqueror 3.5: Server Authentication ................................................................................ 157
Figure 131 Konqueror 3.5: Server Authentication ................................................................................ 157
Figure 132 Konqueror 3.5: KDE SSL Information ................................................................................ 157
Figure 133 Konqueror 3.5: Public Key Certificate File .......................................................................... 158
Figure 134 Konqueror 3.5: Certificate Import Result ............................................................................ 158
Figure 135 Konqueror 3.5: Kleopatra ................................................................................................... 158
Figure 136 Konqueror 3.5: Settings Menu ............................................................................................ 159
Figure 137 Konqueror 3.5: Configure ................................................................................................... 159
Figure 138 Network Number and Host ID ............................................................................................ 162
Figure 139 Subnetting Example: Before Subnetting ............................................................................ 164
Figure 140 Subnetting Example: After Subnetting ............................................................................... 165
Figure 141 Conflicting Computer IP Addresses Example .................................................................... 169
Figure 142 Conflicting Computer IP Addresses Example .................................................................... 169
Figure 143 Conflicting Computer and Router IP Addresses Example .................................................. 170
Figure 144 Pop-up Blocker ................................................................................................................... 171
Figure 145 Internet Options: Privacy .................................................................................................... 172
Figure 146 Internet Options: Privacy .................................................................................................... 173
Figure 147 Pop-up Blocker Settings ..................................................................................................... 173
Figure 148 Internet Options: Security ................................................................................................... 174
Figure 149 Security Settings - Java Scripting ....................................................................................... 175
Figure 150 Security Settings - Java ...................................................................................................... 175
Figure 151 Java (Sun) .......................................................................................................................... 176
Figure 152 Mozilla Firefox: Tools > Options ......................................................................................... 177
Figure 153 Mozilla Firefox Content Security ......................................................................................... 177
Figure 154 Peer-to-Peer Communication in an Ad-hoc Network ......................................................... 179
Figure 155 Basic Service Set ............................................................................................................... 180
Figure 156 Infrastructure WLAN ........................................................................................................... 181
Figure 157 RTS/CTS ........................................................................................................................... 182
Figure 158 WPA(2) with RADIUS Application Example ....................................................................... 189
Figure 159 WPA(2)-PSK Authentication ............................................................................................... 190
18
[Document Title]

Advertisement

Table of Contents
loading

Table of Contents