ZyXEL G-160 User Guide - Page 57

Index

Page 57 highlights

4 4x 2-14 A About 2-27 Accessing the ZyAIR Utility 1-4 Authentication Mode 2-7 Auto 2-7 Shared 2-7 Auto authentication mode 2-7 B Basic Service Set See BSS BSS 2-2 C CA iii Certificate Authority See CA Communication Problem 4-1 Ad-hoc(IBSS 4-2 Infrastructure 4-2 Configuration utility version 2-28 Connecting to a Network 2-12 Copyright ii Disclaimer ii Trademarks ii CTS (Clear to Send 2-4, 2-5 Customer Support vii D Data encryption 2-6 Disable Windows XP Wireless Support..........1-1 ZyAIR G-160 User's Guide Index E EAP Authentication MD5 iii PEAP iii TLS iii TTLS iii Encryption 2-8 ESS 2-3 Extended Service Set See ESS External Configuration 2-11 F Federal Communications Commission (FCC) Interference Statement v Frag Threshold 2-16 Fragmentation Threshold 2-4 H Hidden node 2-5 I IBSS 2-2 Independent Basic Service Set See IBSS Information for Canadian Users iv Caution iv Note iv Infrastructure 2-2 M MD5 iii Message Digest Algorithm 5 See MD5 Message Integrity Check 2-8 MIC See Message Integrity Check Index v

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59

ZyAIR G-160 User’s Guide
Index
v
Index
4
4x
..................................................................
2-14
A
About
............................................................
2-27
Accessing the ZyAIR Utility
...........................
1-4
Authentication Mode
.......................................
2-7
Auto
............................................................
2-7
Shared
.........................................................
2-7
Auto authentication mode
...............................
2-7
B
Basic Service Set
....................................
See
BSS
BSS
.................................................................
2-2
C
CA
.....................................................................
iii
Certificate Authority
................................
See
CA
Communication Problem
................................
4-1
Ad-hoc(IBSS)
.............................................
4-2
Infrastructure
...............................................
4-2
Configuration utility version
.........................
2-28
Connecting to a Network
..............................
2-12
Copyright
...........................................................
ii
Disclaimer
......................................................
ii
Trademarks
....................................................
ii
CTS (Clear to Send
.................................
2-4, 2-5
Customer Support
............................................
vii
D
Data encryption
...............................................
2-6
Disable Windows XP Wireless Support
..........
1-1
E
EAP Authentication
MD5
..............................................................
iii
PEAP
.............................................................
iii
TLS
...............................................................
iii
TTLS
.............................................................
iii
Encryption
.......................................................
2-8
ESS
..................................................................
2-3
Extended Service Set
...............................
See
ESS
External Configuration
..................................
2-11
F
Federal Communications Commission (FCC)
Interference Statement
....................................
v
Frag Threshold
..............................................
2-16
Fragmentation Threshold
................................
2-4
H
Hidden node
....................................................
2-5
I
IBSS
................................................................
2-2
Independent Basic Service Set
..............
See
IBSS
Information for Canadian Users
........................
iv
Caution
..........................................................
iv
Note
...............................................................
iv
Infrastructure
...................................................
2-2
M
MD5
..................................................................
iii
Message Digest Algorithm 5
.................
See
MD5
Message Integrity Check
.................................
2-8
MIC
........................
See
Message Integrity Check