ZyXEL G-110 User Guide - Page 58

ZyXEL G-110 Manual

Page 58 highlights

N Network Configuration Profile 2-9 Deleting 2-10 Saving 2-9 Using a pre-configured profile 2-10 Network Type 2-2 Ad-Hoc(IBSS 2-2 Infrastructure 2-2 O Online Registration iii Open authentication mode 2-13 Operating Mode See Network Type P passphrase 2-12 PEAP A Preface xiii problem description 4-1 Product specifications C Profile 2-9 Network Configuration 2-9 Protected EAP See PEAP R Related Documentation xiii Roaming 2-3 Example 2-4 S Service Set Identity See SSID Shared authentication mode 2-13 Site Survey 2-10 SSID 2-1, 2-7 Syntax Conventions xiii Index ZyAIR G-110 User's Guide T Temporal Key Integrity Protocol 2-14 TKIP.......... See Temporal Key Integrity Protocol TLS A Transmission rate 2-1 Transport Layer Security See TLS Troubleshooting 4-1 Checking Hardware Conflict 4-1 Communication problems 4-1 Radio interference 4-2 Site Survery 4-2 Starting ZyAIR Utility 4-1 TTLS A Tunneled Transport Layer Service .......See TTLS U Upgrading the ZyAIR Utility 3-1 User Authentication 2-13 Using the ZyAIR Utility 2-1 V Viewing Current Configuration 2-4 W Warranty iii Note iii WEP 2-12 WEP Data Encryption Configuring 2-16 WEP Data Encryption with 2-12 WEP Key 2-12 Wired Equivalent Privacy See WEP Wireless LAN Parameters Channel 2-1 Configuring 2-6 Network Type 2-2 SSID 2-1 Transmission Rate 2-1 G

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59

ZyAIR G-110 User’s Guide
Index
G
N
Network Configuration Profile
.......................
2-9
Deleting
.....................................................
2-10
Saving
.........................................................
2-9
Using a pre-configured profile
..................
2-10
Network Type
.................................................
2-2
Ad-Hoc(IBSS)
.............................................
2-2
Infrastructure
...............................................
2-2
O
Online Registration
...........................................
iii
Open authentication mode
.............................
2-13
Operating Mode
.....................
See
Network Type
P
passphrase
.....................................................
2-12
PEAP
.................................................................
A
Preface
............................................................
xiii
problem description
.........................................
4-1
Product specifications
.......................................
C
Profile
..............................................................
2-9
Network Configuration
...............................
2-9
Protected EAP
......................................
See
PEAP
R
Related Documentation
...................................
xiii
Roaming
..........................................................
2-3
Example
......................................................
2-4
S
Service Set Identity
...............................
See
SSID
Shared authentication mode
..........................
2-13
Site Survey
....................................................
2-10
SSID
........................................................
2-1, 2-7
Syntax Conventions
........................................
xiii
T
Temporal Key Integrity Protocol
..................
2-14
TKIP
..........
See
Temporal Key Integrity Protocol
TLS
...................................................................
A
Transmission rate
............................................
2-1
Transport Layer Security
........................
See TLS
Troubleshooting
..............................................
4-1
Checking Hardware Conflict
.......................
4-1
Communication problems
...........................
4-1
Radio interference
.......................................
4-2
Site Survery
.................................................
4-2
Starting ZyAIR Utility
................................
4-1
TTLS
.................................................................
A
Tunneled Transport Layer Service
.......
See
TTLS
U
Upgrading the ZyAIR Utility
..........................
3-1
User Authentication
......................................
2-13
Using the ZyAIR Utility
..................................
2-1
V
Viewing Current Configuration
......................
2-4
W
Warranty
............................................................
iii
Note
...............................................................
iii
WEP
..............................................................
2-12
WEP Data Encryption
Configuring
...............................................
2-16
WEP Data Encryption with
...........................
2-12
WEP Key
.......................................................
2-12
Wired Equivalent Privacy
.....................
See
WEP
Wireless LAN Parameters
Channel
.......................................................
2-1
Configuring
.................................................
2-6
Network Type
..............................................
2-2
SSID
............................................................
2-1
Transmission Rate
.......................................
2-1