User's Manual

Table Of Contents
List of Figures
NWD-270N User’s Guide
13
List of Figures
Figure 1 The NWD-270N ........................................................................................................................ 22
Figure 2 Application: Infrastructure ........................................................................................................ 23
Figure 3 Application: Ad-Hoc ................................................................................................................. 24
Figure 4 ZyXEL Utility: System Tray Icon .............................................................................................. 24
Figure 5 Enable WZC ............................................................................................................................. 25
Figure 6 Infrastructure Network .............................................................................................................. 27
Figure 7 Example WPS Process: PBC Method ...................................................................................... 29
Figure 8 Example WPS Process: PIN Method .......................................................................................30
Figure 9 ZyXEL Utility: Site Survey ........................................................................................................ 31
Figure 10 ZyXEL Utility: Security Settings ............................................................................................. 32
Figure 11 ZyXEL Utility: Summary .......................................................................................................... 32
Figure 12 ZyXEL Utility: Link Info .......................................................................................................... 32
Figure 13 ZyXEL Utility: Profile ............................................................................................................... 33
Figure 14 ZyXEL Utility: Add New Profile ............................................................................................... 33
Figure 15 ZyXEL Utility: Profile Security ................................................................................................. 34
Figure 16 ZyXEL Utility: Profile Encryption ............................................................................................. 34
Figure 17 ZyXEL Utility: Profile Summary .............................................................................................. 34
Figure 18 ZyXEL Utility: Profile Activate ................................................................................................. 35
Figure 19 Example of a Wireless Network ............................................................................................. 38
Figure 20 Example WPS Process: PIN Method ..................................................................................... 43
Figure 21 How WPS works ..................................................................................................................... 44
Figure 22 WPS: Example Network Step 1 .............................................................................................. 45
Figure 23 WPS: Example Network Step 2 .............................................................................................. 45
Figure 24 WPS: Example Network Step 3 .............................................................................................. 46
Figure 25 ZyXEL Utility Menu Summary ............................................................................................... 50
Figure 26 Link Info ................................................................................................................................. 51
Figure 27 Link Info: Trend Chart ............................................................................................................ 52
Figure 28 Site Survey ............................................................................................................................ 53
Figure 29 Security Setting Selection .................................................................................................... 54
Figure 30 Security Setting: WEP .......................................................................................................... 54
Figure 31 Security Setting: WPA-PSK/WPA2-PSK ................................................................................. 56
Figure 32 Security Settings: WPA/WPA2 ................................................................................................ 56
Figure 33 Security Setting: 802.1x ........................................................................................................ 58
Figure 34 Summary Screen ................................................................................................................... 59
Figure 35 Profile ................................................................................................................................... 60
Figure 36 Profile: Add a New Profile ..................................................................................................... 61
Figure 37 Profile: Wireless Settings ...................................................................................................... 62
Figure 38 Profile: Wireless Settings ...................................................................................................... 63