... | ... | @@ -40,27 +40,36 @@ Para cualquiera de los dos registros la forma de utilizar el servicio va a ser l |
|
|
- Instalamos SecureW2 según la siguiente secuencia
|
|
|
|
|
|
![secureW21](uploads/652d4ff0495db8e0597352c1faf15d5f/secureW21.jpg)
|
|
|
|
|
|
![secureW22](uploads/49cb841686cc56bea334f2a02a652b38/secureW22.jpg)
|
|
|
|
|
|
![secureW23](uploads/428fc177d58b81e4cbce48d0fa388359/secureW23.jpg)
|
|
|
|
|
|
- Reiniciamos el ordenador
|
|
|
- Administrar redes inalámbricas
|
|
|
|
|
|
![secureW24](uploads/90296784908e7b255db3659ad2ff1424/secureW24.jpg)
|
|
|
|
|
|
![secureW25](uploads/33c1f908f1a4805a05bbec426f6837b9/secureW25.jpg)
|
|
|
|
|
|
![secureW26](uploads/703576cacd592e4eaa1ec1f15978ad30/secureW26.jpg)
|
|
|
|
|
|
- Cargamos los datos de la red
|
|
|
|
|
|
![secureW27](uploads/6040d812cc4536f2d222a824890213bf/secureW27.jpg)
|
|
|
|
|
|
![secureW28](uploads/5cb626c1576b5383b5c5bd2f8981f941/secureW28.jpg)
|
|
|
|
|
|
![secureW29](uploads/e342e933245d1dd99244c5f8f532f3c6/secureW29.jpg)
|
|
|
|
|
|
- Ponemos los datos tal cual las capturas
|
|
|
|
|
|
![secureW210](uploads/26f592d88f0d5c3cc929c970e478b42e/secureW210.jpg)
|
|
|
|
|
|
![secureW211](uploads/c73f924dcabd8e314d26cb5af6f3b022/secureW211.jpg)
|
|
|
|
|
|
![secureW212](uploads/8dd00e60ff1f9a03f0af6530238bbfef/secureW212.jpg)
|
|
|
|
|
|
![secureW213](uploads/87db83d81088c18b4029736f0c354e34/secureW213.jpg)
|
|
|
|
|
|
- Desmarcamos la casilla "Pedir credenciales de usuario"
|
... | ... | |