User`s guide

List of Figures
P-2602HWUDL-D User’s Guide
33
Figure 340 Windows Vista: Advanced TCP/IP Properties .................................................................... 459
Figure 341 Windows Vista: Internet Protocol Version 4 (TCP/IPv4) Properties ................................... 460
Figure 342 Macintosh OS 8/9: Apple Menu .......................................................................................... 461
Figure 343 Macintosh OS 8/9: TCP/IP ................................................................................................. 461
Figure 344 Macintosh OS X: Apple Menu ............................................................................................ 462
Figure 345 Macintosh OS X: Network .................................................................................................. 463
Figure 346 Red Hat 9.0: KDE: Network Configuration: Devices ......................................................... 464
Figure 347 Red Hat 9.0: KDE: Ethernet Device: General .................................................................. 464
Figure 348 Red Hat 9.0: KDE: Network Configuration: DNS ............................................................... 465
Figure 349 Red Hat 9.0: KDE: Network Configuration: Activate ........................................................ 465
Figure 350 Red Hat 9.0: Dynamic IP Address Setting in ifconfig-eth0 ............................................... 466
Figure 351 Red Hat 9.0: Static IP Address Setting in ifconfig-eth0 ................................................... 466
Figure 352 Red Hat 9.0: DNS Settings in resolv.conf ........................................................................ 466
Figure 353 Red Hat 9.0: Restart Ethernet Card ................................................................................. 466
Figure 354 Red Hat 9.0: Checking TCP/IP Properties ....................................................................... 467
Figure 355 Pop-up Blocker ................................................................................................................... 469
Figure 356 Internet Options: Privacy .................................................................................................... 470
Figure 357 Internet Options: Privacy .................................................................................................... 471
Figure 358 Pop-up Blocker Settings ..................................................................................................... 471
Figure 359 Internet Options: Security ................................................................................................... 472
Figure 360 Security Settings - Java Scripting ....................................................................................... 473
Figure 361 Security Settings - Java ...................................................................................................... 473
Figure 362 Java (Sun) .......................................................................................................................... 474
Figure 363 Mozilla Firefox: Tools > Options ......................................................................................... 475
Figure 364 Mozilla Firefox Content Security ......................................................................................... 475
Figure 365 Network Number and Host ID ............................................................................................ 478
Figure 366 Subnetting Example: Before Subnetting ............................................................................ 480
Figure 367 Subnetting Example: After Subnetting ............................................................................... 481
Figure 368 Peer-to-Peer Communication in an Ad-hoc Network ......................................................... 485
Figure 369 Basic Service Set ............................................................................................................... 486
Figure 370 Infrastructure WLAN ........................................................................................................... 487
Figure 371 RTS/CTS ........................................................................................................................... 488
Figure 372 WPA(2) with RADIUS Application Example ....................................................................... 495
Figure 373 WPA(2)-PSK Authentication ............................................................................................... 496
Figure 374 Configuration Text File Format: Column Descriptions ........................................................ 503
Figure 375 Invalid Parameter Entered: Command Line Example ........................................................ 504
Figure 376 Valid Parameter Entered: Command Line Example ........................................................... 504
Figure 377 Internal SPTGEN FTP Download Example ........................................................................ 505
Figure 378 Internal SPTGEN FTP Upload Example ............................................................................ 505