ZyXEL G-160 User Guide - Page 58

ZyAIR G-160 User's Guide, Index, WEP Data Encryption

Page 58 highlights

ZyAIR G-160 User's Guide N Network driver version 2-28 Network Type 2-2 Ad-Hoc(IBSS 2-2 Infrastructure 2-2 NIC firmware version 2-29 O Online Registration iii Open authentication mode 2-7 P Packet Burst 2-14 PEAP iii Preamble Mode 2-7 Preface xiii problem description 4-1 Product specifications i Proprietary transmission rates 2-15 Protected EAP See PEAP R Related Documentation xiii Roaming 2-3 Example 2-4 RTS (Request To Send 2-4, 2-5 RTS Threshold 2-5, 2-16 RTS/CTS handshake 2-5 S Service Set Identity See SSID Shared authentication mode 2-7 Site Survey 2-26 SSID 2-1, 2-13 State 2-11 Syntax Conventions xiii vi T Temporal Key Integrity Protocol 2-8 Threshold 2-16 TKIP ..........See Temporal Key Integrity Protocol TLS iii Transmission rate 2-1 Transmission rates 2-14 Transmission speeds 2-14 Transport Layer Security See TLS Troubleshooting 4-1 Checking Hardware Conflict 4-1 Communication problems 4-1 Radio interference 4-2 Starting ZyAIR Utility 4-1 TTLS iii Tunneled Transport Layer Service....... See TTLS U Upgrading the ZyAIR Utility 3-1 User Authentication 2-8 Using the ZyAIR Utility 2-1 W Warranty iii Note iii WEP 2-6 WEP Data Encryption Configuring 2-19 WEP Data Encryption with 2-6 WEP Key 2-6 Windows XP Zero Configuration 1-1 Wired Equivalent Privacy See WEP Wireless LAN Parameters Channel 2-1 Configuring 2-10 Network Type 2-2 SSID 2-1 Transmission Rate 2-1 Wireless LAN Security Index

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59

ZyAIR G-160 User’s Guide
vi
Index
N
Network driver version
.................................
2-28
Network Type
.................................................
2-2
Ad-Hoc(IBSS)
............................................
2-2
Infrastructure
...............................................
2-2
NIC firmware version
...................................
2-29
O
Online Registration
...........................................
iii
Open authentication mode
..............................
2-7
P
Packet Burst
..................................................
2-14
PEAP
................................................................
iii
Preamble Mode
...............................................
2-7
Preface
............................................................
xiii
problem description
........................................
4-1
Product specifications
.........................................
i
Proprietary transmission rates
.......................
2-15
Protected EAP
......................................
See
PEAP
R
Related Documentation
...................................
xiii
Roaming
..........................................................
2-3
Example
......................................................
2-4
RTS (Request To Send)
...........................
2-4, 2-5
RTS Threshold
.......................................
2-5, 2-16
RTS/CTS handshake
.......................................
2-5
S
Service Set Identity
...............................
See
SSID
Shared authentication mode
............................
2-7
Site Survey
....................................................
2-26
SSID
......................................................
2-1, 2-13
State
..............................................................
2-11
Syntax Conventions
........................................
xiii
T
Temporal Key Integrity Protocol
....................
2-8
Threshold
......................................................
2-16
TKIP
..........
See
Temporal Key Integrity Protocol
TLS
...................................................................
iii
Transmission rate
............................................
2-1
Transmission rates
........................................
2-14
Transmission speeds
.....................................
2-14
Transport Layer Security
.......................
See TLS
Troubleshooting
..............................................
4-1
Checking Hardware Conflict
......................
4-1
Communication problems
...........................
4-1
Radio interference
.......................................
4-2
Starting ZyAIR Utility
................................
4-1
TTLS
.................................................................
iii
Tunneled Transport Layer Service
.......
See
TTLS
U
Upgrading the ZyAIR Utility
..........................
3-1
User Authentication
........................................
2-8
Using the ZyAIR Utility
.................................
2-1
W
Warranty
...........................................................
iii
Note
...............................................................
iii
WEP
................................................................
2-6
WEP Data Encryption
Configuring
...............................................
2-19
WEP Data Encryption with
.............................
2-6
WEP Key
........................................................
2-6
Windows XP Zero Configuration
...................
1-1
Wired Equivalent Privacy
.....................
See
WEP
Wireless LAN Parameters
Channel
.......................................................
2-1
Configuring
...............................................
2-10
Network Type
.............................................
2-2
SSID
............................................................
2-1
Transmission Rate
.......................................
2-1
Wireless LAN Security