ZyAIR G-160 User’s Guide
Index
v
Index
4
4x
..................................................................
2-14
A
About
............................................................
2-27
Accessing the ZyAIR Utility
...........................
1-4
Authentication Mode
.......................................
2-7
Auto
............................................................
2-7
Shared
.........................................................
2-7
Auto authentication mode
...............................
2-7
B
Basic Service Set
....................................
See
BSS
BSS
.................................................................
2-2
C
CA
.....................................................................
iii
Certificate Authority
................................
See
CA
Communication Problem
................................
4-1
Ad-hoc(IBSS)
.............................................
4-2
Infrastructure
...............................................
4-2
Configuration utility version
.........................
2-28
Connecting to a Network
..............................
2-12
Copyright
...........................................................
ii
Disclaimer
......................................................
ii
Trademarks
....................................................
ii
CTS (Clear to Send
.................................
2-4, 2-5
Customer Support
............................................
vii
D
Data encryption
...............................................
2-6
Disable Windows XP Wireless Support
..........
1-1
E
EAP Authentication
MD5
..............................................................
iii
PEAP
.............................................................
iii
TLS
...............................................................
iii
TTLS
.............................................................
iii
Encryption
.......................................................
2-8
ESS
..................................................................
2-3
Extended Service Set
...............................
See
ESS
External Configuration
..................................
2-11
F
Federal Communications Commission (FCC)
Interference Statement
....................................
v
Frag Threshold
..............................................
2-16
Fragmentation Threshold
................................
2-4
H
Hidden node
....................................................
2-5
I
IBSS
................................................................
2-2
Independent Basic Service Set
..............
See
IBSS
Information for Canadian Users
........................
iv
Caution
..........................................................
iv
Note
...............................................................
iv
Infrastructure
...................................................
2-2
M
MD5
..................................................................
iii
Message Digest Algorithm 5
.................
See
MD5
Message Integrity Check
.................................
2-8
MIC
........................
See
Message Integrity Check