List of figures – Equinox Systems ZyAIR G-200 User Manual

Page 11

Advertising
background image

ZyAIR G-200 User’s Guide

List of Figures

xi

List of Figures

Figure 1-1 Windows XP: System Tray Icon ................................................................................................ 1-1

Figure 1-2 Windows XP: System Tray Icon ................................................................................................ 1-1

Figure 1-3 Windows XP: Wireless Network Connection Status.................................................................. 1-2

Figure 1-4 Windows XP: Connect to Wireless Network ............................................................................. 1-2

Figure 1-5 Windows XP: Wireless Network Connection Properties ........................................................... 1-3

Figure 1-6 ZyAIR Utility: System Tray Icon .............................................................................................. 1-3

Figure 2-1 Ad-hoc Network Example ......................................................................................................... 2-1

Figure 2-2 BSS Example ............................................................................................................................. 2-2

Figure 2-3 Infrastructure Network Example................................................................................................ 2-2

Figure 2-4 Roaming Example...................................................................................................................... 2-3

Figure 2-5 ZyAIR Utility: Link Info ........................................................................................................... 2-3

Figure 2-6 Site Survey................................................................................................................................. 2-5

Figure 2-7 Configuration............................................................................................................................. 2-6

Figure 2-8 ZyAIR Wireless Security Levels ............................................................................................... 2-7

Figure 2-9 WEP Authentication Steps ......................................................................................................... 2-9

Figure 2-10 WEP Authentication............................................................................................................... 2-10

Figure 2-11 WPA Authentication............................................................................................................... 2-12

Figure 2-12

WPA - PSK Authentication.................................................................................................... 2-14

Figure 2-13 WPA with RADIUS Application Example............................................................................. 2-15

Figure 2-14 WPA-PSK Authentication...................................................................................................... 2-15

Figure 2-15 802.1x Authentication............................................................................................................ 2-17

Figure 2-16 About ..................................................................................................................................... 2-18

Figure 3-1 Confirm Uninstallation .............................................................................................................. 3-1

Figure 3-2 ZyAIR Utility: Exit.................................................................................................................... 3-2

Figure 3-3 Removable Device System Tray Icon: Windows XP................................................................. 3-2

Figure 3-4 Safely Remove Hardware: Windows XP ................................................................................... 3-2

Figure 3-5 Problem Ejecting Message: Windows XP ................................................................................. 3-2

Figure 3-6 Stop a Hardware device: Windows XP ...................................................................................... 3-3

Figure 3-7 Safe To Remove Hardware Message: Windows XP .................................................................. 3-3

Advertising