ZyXEL G-300 User Guide - Page 71

Index

Page 71 highlights

A About 2-20 Accessing the ZyAIR Utility 1-2 AdHoc Channel 2-11 authentication 2-19 authentication mode 2-14 Authentication Mode 2-6 Open 2-6 Shared 2-6 automatically key generation 2-15 B Basic Service Set See BSS BSS 2-2 C CA Y certificate 2-17 server 2-18 user 2-17 Certificate Authority See CA Certificate Authority (CA 2-18 Certificate screen, the 2-16 Communication Problem 4-1 Ad-hoc(IBSS 4-2 Infrastructure 4-1 Configuration utility version 2-21 Connecting to a Network 2-20 Copyright ii Disclaimer ii Trademarks ii CTS (Clear to Send 2-4, 2-5 Customer Support vii Index ZyAIR G-300 User's Guide Index D Data encryption 2-6 Disable Windows XP Wireless Support... 1-1 E EAP Authentication MD5 Y PEAP Y TLS Y TTLS Y EAP type 2-15 encryption 2-19 Encryption 2-7 encryption method 2-14 ESS 2-2 Extended Service Set See ESS F Federal Communications Commission (FCC) Interference Statement v Frag Threshold 2-13 Fragmentation Threshold 2-4 Frequency domain 2-21 G Graphics Icons Key xiii H Hidden node 2-4 I IBSS 2-1 CC

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73

ZyAIR G-300 User’s Guide
Index
CC
Index
A
About
.....................................................
2-20
Accessing the ZyAIR Utility
.....................
1-2
AdHoc Channel
.....................................
2-11
authentication
........................................
2-19
authentication mode
..............................
2-14
Authentication Mode
................................
2-6
Open
....................................................
2-6
Shared
..................................................
2-6
automatically key generation
.................
2-15
B
Basic Service Set
...........................
See
BSS
BSS
..........................................................
2-2
C
CA
...............................................................
Y
certificate
...............................................
2-17
server
.................................................
2-18
user
....................................................
2-17
Certificate Authority
..........................
See
CA
Certificate Authority (CA)
.......................
2-18
Certificate screen, the
............................
2-16
Communication Problem
.........................
4-1
Ad-hoc(IBSS)
.......................................
4-2
Infrastructure
........................................
4-1
Configuration utility version
...................
2-21
Connecting to a Network
.......................
2-20
Copyright
.....................................................
ii
Disclaimer
................................................
ii
Trademarks
..............................................
ii
CTS (Clear to Send
..........................
2-4, 2-5
Customer Support
.....................................
vii
D
Data encryption
........................................
2-6
Disable Windows XP Wireless Support... 1-1
E
EAP Authentication
MD5
.........................................................
Y
PEAP
.......................................................
Y
TLS
..........................................................
Y
TTLS
........................................................
Y
EAP type
................................................
2-15
encryption
..............................................
2-19
Encryption
................................................
2-7
encryption method
.................................
2-14
ESS
..........................................................
2-2
Extended Service Set
.....................
See
ESS
F
Federal Communications Commission
(FCC) Interference Statement
..................
v
Frag Threshold
.......................................
2-13
Fragmentation Threshold
.........................
2-4
Frequency domain
.................................
2-21
G
Graphics Icons Key
...................................
xiii
H
Hidden node
.............................................
2-4
I
IBSS
.........................................................
2-1