Click the Add button to create a new profile see section below for further details , the Delete button to delete a selected profile, the Edit button to modify a selected profile and click the Activate button to have a selected profile become active. Page 8 Step 7: Page 15 Step 8: This mechanism is a way to prevent data collision when WLAN equipments require transmission. Enter a WEP key.
|Date Added:||18 March 2017|
|File Size:||52.94 Mb|
|Operating Systems:||Windows NT/2000/XP/2003/2003/7/8/10 MacOS 10/X|
|Price:||Free* [*Free Regsitration Required]|
Page 28 This value can be a server name or the name of a domain where the server is located.
By pressing ‘print’ button you will print only current page. Chapter 5 Hardware Specifications 1.
GN-WBKG (rev. ) | Wireless Product – GIGABYTE Puerto Rico
Page 19 Step 8: Page 12 Step 8: Enter a WEP key. The Client can verify if such server is reliable and then transmit Client Certificate after the verification is confirmed. You may specify up to 4 Keys 2. There are six LED indicators: Table of Contents Add to my manuals Add. To print the manual completely, please, download it.
Add Profile – G-nwbkg and Security If an authentication or security setting is configured in a wireless access point or wireless router, it is necessary for the Wireless USB STICK Adapter profile to match the security parameters in order to obtain access and establish a connection.
Page 11 Step 6: Both WEP Encryption and Got it, continue to print.
Gigabyte GN-WBKG User Manual
When the Welcome screen appears, click Next. Page of 35 Go.
If the screen below appears, this does not mean there is a problem. The About Tab Don’t have an account?
When the Welcome screen appears, click Next. This value can be a server name or ggiabyte name of a domain where the server is located. Don’t show me this message again. Click Yes to continue with installation. Identity — Enter the name of the user account. Page 14 Step 6: Verify CA Server – 1.
GN-WBKG (rev. ) | Wireless Product – GIGABYTE Czech Republic
Click Yes to continue. Authentication — Displays authentication type associated with profile.
Therefore, they are hidden nodes for each other and can not detect each other. When the Welcome screen appears, click Next Step 7: Gigbyte limits are designed to provide reasonable protection against harmful interference in a residential installation.
Comments to this Manuals Your Name. Page 24 Figure Page 15 Step 8: Page 27 Figure Enter text from picture: