ZyAIR Wireless LAN Utility
Index
Q
Index
A
About
..............................................................
5-1
About the ZyAIR Utility
.................................
5-1
Access point mode
..........................................
1-5
Access Point Mode
..........................................
4-1
Additional setup requirements
....................
4-1
Configuration
..............................................
4-4
Link Info
.....................................................
4-2
Link Status
..................................................
4-6
MAC Filter
..................................................
4-8
Power saving mode
.....................................
4-5
Security
.......................................................
4-7
Setup example
...............................................
M
Accessing the ZyAIR Utility
...........................
1-4
Advanced
........................................................
3-9
Antenna gain
...................................................
4-5
Authentication Mode
.......................................
2-6
Auto
............................................................
2-7
Open
............................................................
2-7
Shared
.........................................................
2-7
Authentication Type
......................................
3-10
Auto authentication mode
...............................
2-7
Automatic WEP key generation
......................
2-5
C
Communication Problem
Ad-hoc(IBSS)
.............................................
6-2
Infrastructure
...............................................
6-2
Computer’s IP Address
.....................................
A
Configuration
..........................................
3-2, 4-3
Connecting to a Network
................................
3-6
Copyright
...........................................................
ii
Disclaimer
......................................................
ii
Trademarks
....................................................
ii
Create with Passphrase
....................................
3-8
CTS (Clear to Send
.........................................
2-6
Customer Support
............................................
vii
D
Data encryption
...............................................
2-5
E
ESS
..................................................................
2-3
Extended Service Set
...............................
See
ESS
F
Federal Communications Commission (FCC)
Interference Statement
....................................
v
Model Specific
...............................................
v
Filter MAC address
.........................................
4-9
Fragmentation Threshold
......................
2-5, 3-10
G
Graphics Icons Key
.........................................
xiv
H
Hidden node
....................................................
2-5
I
IBSS
................................................................
2-2
Independent Basic Service Set
..............
See
IBSS
Information for Canadian Users
........................
iv
Caution
..........................................................
iv
Note
...............................................................
iv
L
Link Info
.................................................
3-1, 4-1
Link Status
......................................................
4-6