Many
Manuals
search
Catégories
Marques
Accueil
ZyXEL Communications
Cartes de réseautage
G-302 V3
Guide de l'utilisateur
ZyXEL Communications G-302 V3 Guide de l'utilisateur Page 4
Télécharger
Partager
Partage
Ajouter à mon manuel
Imprimer
Page
/
77
Table des matières
DEPANNAGE
MARQUE LIVRES
Noté
.
/ 5. Basé sur
avis des utilisateurs
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
ZyXEL G-302 v3 User’s Guide
4
Preface
Graphics Icons Key
Access Point
Computer
Notebook Computer
Server
Internet Cloud
Wireless Signal
1
2
3
4
5
6
7
8
9
...
76
77
ZyXEL G-302 v3
1
About This User's Guide
3
Related Documentation
3
User Guide Feedback
3
Syntax Conventions
3
Graphics Icons Key
4
Safety Warnings
5
6 Preface
6
Copyright
7
Certifications
8
Notices
9
ZyXEL Limited Warranty
10
Customer Support
11
ZyXEL G-302 v3 User’s Guide
12
12 Customer Support
12
Table of Contents
13
Table of Contents 15
15
16 Table of Contents
16
List of Figures
17
List of Tables
19
20 List of Tables
20
CHAPTER 1
21
1.1.2.1 Infrastructure
22
1.1.2.2 Ad-Hoc
22
1.3 Configuration Methods
23
1.4 Windows XP Users Only
23
COLOR DESCRIPTION
24
1.7.1 Site Survey
25
26 Chapter 1 Getting Started
26
Chapter 1 Getting Started 27
27
28 Chapter 1 Getting Started
28
CHAPTER 2
29
2.2.2 IEEE 802.1x
30
2.2.3 WPA and WPA2
31
2.3 Authentication Type
33
2.4 Preamble Type
33
CHAPTER 3
35
3.1.1 Trend Chart
36
Figure 14 Site Survey
37
Table 5 Site Survey
37
3.2.2 Security Settings
38
3.2.2.1 WEP Encryption
39
3.2.2.2 WPA/WPA2
40
3.2.2.3 WPA-PSK/WPA2-PSK
41
3.3 The Profile Screen
42
Figure 19 Profile Screen
43
Table 10 Profile Screen
43
3.3.1 Adding a New Profile
44
3.4 The Adapter Screen
48
CHAPTER 4
49
50 Chapter 4 Maintenance
50
CHAPTER 5
51
52 Chapter 5 Troubleshooting
52
Chapter 5 Troubleshooting 53
53
54 Chapter 5 Troubleshooting
54
APPENDIX A
55
APPENDIX B
57
Security Settings
61
Association
62
Authentication
63
Authentication Properties
64
APPENDIX C
69
PEAP (Protected EAP)
70
Dynamic WEP Key Exchange
70
Encryption
71
User Authentication
72
Security Parameters Summary
74
Index 75
75
76 Index
76
Index 77
77
Commentaires sur ces manuels
Pas de commentaire
Publish
Imprimer le document
Imprimer la page 4
Commentaires sur ces manuels