Click the Add button to create a new profile see section below for further details , the Delete button to delete a selected profile, the Edit button to modify a selected profile and click the Activate button to have a selected profile become active. Page 8 Step 7: Page 15 Step 8: This mechanism is a way to prevent data collision when WLAN equipments require transmission. Enter a WEP key.

Uploader: Faujin
Date Added: 18 March 2017
File Size: 52.94 Mb
Operating Systems: Windows NT/2000/XP/2003/2003/7/8/10 MacOS 10/X
Downloads: 97270
Price: Free* [*Free Regsitration Required]

Page 28 This value can be a server name or the name of a domain where the server is located.

By pressing ‘print’ button you will print only current page. Chapter 5 Hardware Specifications 1.

GN-WBKG (rev. ) | Wireless Product – GIGABYTE Puerto Rico

Page 19 Step 8: Page 12 Step 8: Enter a WEP key. The Client can verify if such server is reliable and then transmit Client Certificate after the verification is confirmed. You may specify up to 4 Keys 2. There are six LED indicators: Table of Contents Add to my manuals Add. To print the manual completely, please, download it.


Add Profile – G-nwbkg and Security If an authentication or security setting is configured in a wireless access point or wireless router, it is necessary for the Wireless USB STICK Adapter profile to match the security parameters in order to obtain access and establish a connection.

Page 11 Step 6: Both WEP Encryption and Got it, continue to print.

Gigabyte GN-WBKG User Manual

When the Welcome screen appears, click Next. Page of 35 Go.

If the screen below appears, this does not mean there is a problem. The About Tab Don’t have an account?

When the Welcome screen appears, click Next. This value can be a server name or ggiabyte name of a domain where the server is located. Don’t show me this message again. Click Yes to continue with installation. Identity — Enter the name of the user account. Page 14 Step 6: Verify CA Server – 1.

GN-WBKG (rev. ) | Wireless Product – GIGABYTE Czech Republic

Click Yes to continue. Authentication — Displays authentication type associated with profile.


Therefore, they are hidden nodes for each other and can not detect each other. When the Welcome screen appears, click Next Step 7: Gigbyte limits are designed to provide reasonable protection against harmful interference in a residential installation.

Comments to this Manuals Your Name. Page 24 Figure Page 15 Step 8: Page 27 Figure Enter text from picture: