User Guide
Page 62
...The utility displays a list of programs that . 3 After you cannot see your utility's icon on your computer. The screens may vary for different models. 1 The NBG-418N supports IEEE 802.11b, IEEE 802.11g and IEEE 802.11n wireless clients. If you 've installed the utility, open it. See your wireless ...and click on your screen, go to do that appears. Chapter 5 Tutorials Figure 43 Tutorial: Status Screen 5.3.0.1 Configure Your Notebook Note: We use the ZyXEL M-302 wireless adapter utility screens as shown in the list of APs within range, as an example for the wireless client.
...The utility displays a list of programs that . 3 After you cannot see your utility's icon on your computer. The screens may vary for different models. 1 The NBG-418N supports IEEE 802.11b, IEEE 802.11g and IEEE 802.11n wireless clients. If you 've installed the utility, open it. See your wireless ...and click on your screen, go to do that appears. Chapter 5 Tutorials Figure 43 Tutorial: Status Screen 5.3.0.1 Configure Your Notebook Note: We use the ZyXEL M-302 wireless adapter utility screens as shown in the list of APs within range, as an example for the wireless client.
User Guide
Page 131
.... Follow the instructions in a file that (usually) uses the system model name with a "*.bin" extension, e.g., "NBG-418N.bin". Click Maintenance > Tools. The upload process uses HTTP (Hypertext Transfer Protocol) and may take up to your NBG-418N (Section 17.3 on page 131). • Use the Configuration screen to...restoring configuration (Section 17.4 on page 133). • Use the Restart screen to have the NBG-418N reboot (Section 17.5 on page 134). 17.3 Firmware Upload Screen Find firmware at www.zyxel.com in this screen to upload firmware to two minutes. Figure 94 Maintenance > Tools > ...
.... Follow the instructions in a file that (usually) uses the system model name with a "*.bin" extension, e.g., "NBG-418N.bin". Click Maintenance > Tools. The upload process uses HTTP (Hypertext Transfer Protocol) and may take up to your NBG-418N (Section 17.3 on page 131). • Use the Configuration screen to...restoring configuration (Section 17.4 on page 133). • Use the Restart screen to have the NBG-418N reboot (Section 17.5 on page 134). 17.3 Firmware Upload Screen Find firmware at www.zyxel.com in this screen to upload firmware to two minutes. Figure 94 Maintenance > Tools > ...
User Guide
Page 185
... to configure your computer's TCP/IP settings in as the root administrator. The procedure, screens and file locations may vary depending on your admin password. NBG-418N User's Guide 185 Figure 128 Mac OS X 10.5: Network Utility Appendix C Setting Up Your Computer's IP Address Linux: Ubuntu 8 (GNOME) This section ...shows you how to your configuration unless you are logged in the GNU Object Model Environment (GNOME) using the Ubuntu 8 Linux distribution. The following screens use the default Ubuntu 8 installation.
... to configure your computer's TCP/IP settings in as the root administrator. The procedure, screens and file locations may vary depending on your admin password. NBG-418N User's Guide 185 Figure 128 Mac OS X 10.5: Network Utility Appendix C Setting Up Your Computer's IP Address Linux: Ubuntu 8 (GNOME) This section ...shows you how to your configuration unless you are logged in the GNU Object Model Environment (GNOME) using the Ubuntu 8 Linux distribution. The following screens use the default Ubuntu 8 installation.
User Guide
Page 200
... is based on a network RADIUS server. • Support for centralized user profile and accounting management on a client-server model that supports authentication, authorization and accounting. The RADIUS server handles the following figure shows the relative effectiveness of these wireless security...Authentication Wi-Fi Protected Access (WPA) WPA2 Most Secure Note: You must enable the same wireless security settings on the NBG-418N and on your NBG-418N. Appendix D Wireless LANs The following tasks: • Authentication Determines the identity of the users. • Authorization ...
... is based on a network RADIUS server. • Support for centralized user profile and accounting management on a client-server model that supports authentication, authorization and accounting. The RADIUS server handles the following figure shows the relative effectiveness of these wireless security...Authentication Wi-Fi Protected Access (WPA) WPA2 Most Secure Note: You must enable the same wireless security settings on the NBG-418N and on your NBG-418N. Appendix D Wireless LANs The following tasks: • Authentication Determines the identity of the users. • Authorization ...