ZyXEL B-220 User Guide - Page 73

Index

Page 73 highlights

A About 5-1 About the ZyAIR Utility 5-1 Access point mode 1-5 Access Point Mode 4-1 Additional setup requirements 4-1 Configuration 4-4 Link Info 4-2 Link Status 4-6 MAC Filter 4-8 Power saving mode 4-5 Security 4-7 Setup example M Accessing the ZyAIR Utility 1-4 Advanced 3-9 Antenna gain 4-5 Authentication Mode 2-6 Auto 2-7 Open 2-7 Shared 2-7 Authentication Type 3-10 Auto authentication mode 2-7 Automatic WEP key generation 2-5 C Communication Problem Ad-hoc(IBSS 6-2 Infrastructure 6-2 Computer's IP Address A Configuration 3-2, 4-3 Connecting to a Network 3-6 Copyright ii Disclaimer ii Trademarks ii Create with Passphrase 3-8 CTS (Clear to Send 2-6 Customer Support vii Index ZyAIR Wireless LAN Utility Index D Data encryption 2-5 E ESS 2-3 Extended Service Set See ESS F Federal Communications Commission (FCC) Interference Statement v Model Specific v Filter MAC address 4-9 Fragmentation Threshold 2-5, 3-10 G Graphics Icons Key xiv H Hidden node 2-5 I IBSS 2-2 Independent Basic Service Set See IBSS Information for Canadian Users iv Caution iv Note iv L Link Info 3-1, 4-1 Link Status 4-6 Q

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75

ZyAIR Wireless LAN Utility
Index
Q
Index
A
About
..............................................................
5-1
About the ZyAIR Utility
.................................
5-1
Access point mode
..........................................
1-5
Access Point Mode
..........................................
4-1
Additional setup requirements
....................
4-1
Configuration
..............................................
4-4
Link Info
.....................................................
4-2
Link Status
..................................................
4-6
MAC Filter
..................................................
4-8
Power saving mode
.....................................
4-5
Security
.......................................................
4-7
Setup example
...............................................
M
Accessing the ZyAIR Utility
...........................
1-4
Advanced
........................................................
3-9
Antenna gain
...................................................
4-5
Authentication Mode
.......................................
2-6
Auto
............................................................
2-7
Open
............................................................
2-7
Shared
.........................................................
2-7
Authentication Type
......................................
3-10
Auto authentication mode
...............................
2-7
Automatic WEP key generation
......................
2-5
C
Communication Problem
Ad-hoc(IBSS)
.............................................
6-2
Infrastructure
...............................................
6-2
Computer’s IP Address
.....................................
A
Configuration
..........................................
3-2, 4-3
Connecting to a Network
................................
3-6
Copyright
...........................................................
ii
Disclaimer
......................................................
ii
Trademarks
....................................................
ii
Create with Passphrase
....................................
3-8
CTS (Clear to Send
.........................................
2-6
Customer Support
............................................
vii
D
Data encryption
...............................................
2-5
E
ESS
..................................................................
2-3
Extended Service Set
...............................
See
ESS
F
Federal Communications Commission (FCC)
Interference Statement
....................................
v
Model Specific
...............................................
v
Filter MAC address
.........................................
4-9
Fragmentation Threshold
......................
2-5, 3-10
G
Graphics Icons Key
.........................................
xiv
H
Hidden node
....................................................
2-5
I
IBSS
................................................................
2-2
Independent Basic Service Set
..............
See
IBSS
Information for Canadian Users
........................
iv
Caution
..........................................................
iv
Note
...............................................................
iv
L
Link Info
.................................................
3-1, 4-1
Link Status
......................................................
4-6