ZyXEL G-200 User Guide - Page 51

Index

Page 51 highlights

A About 2-17 Accessing the ZyAIR Utility 1-3 Ad-hoc Configuration A Automatic WEP key generation 2-8 B Basic Service Set See BSS BSS 2-2, A C CA E Certificate Authority See CA Communication Problem 4-1 Ad-hoc(IBSS 4-2 Infrastructure 4-1 Configuration Utility yersion 2-18 Connecting to a Wireless Network.......... 2-5 Copyright ii Disclaimer ii Trademarks ii Customer Support vii D Data encryption 2-8 Direct Sequence Spread SpectrumSee DSSS Disable Windows XP Wireless Support.. 1-1 Disconnecting the ZyAIR from your computer 3-1 Distribution System See DS DS B DSSS A E EAP 2-16 EAP Authentication E MD5 E PEAP E TLS E TTLS E Encryption 2-12 ESS 2-2, B Extended Service Set See ESS Extensible Authentication Protocol ......See EAP Index ZyAIR G-200 User's Guide Index F Federal Communications Commission (FCC) Interference Statement v FHSS A Frequency Hopping Spectrum ...... See FHSS I IBSS 2-1, A IEEE 802.11 A Deployment Issues C Security Flaws C IEEE 802.1x C Advantages C Independent Basic Service Set...A. See IBSS Information for Canadian Users iv Caution iv Note iv Infrastructure 2-2 Infrastructure Configuration B L Link Info 2-3 M MD5 E Message Digest Algorithm 5 ..........See MD5 N Network Topology With RADIUS Server Example C Network Type 2-1 Ad-Hoc(IBSS 2-1 Infrastructure 2-2 O Online Registration iii Open System 2-9 Operating Mode See Network Type P Passphrase........... 2-8, 2-10, 2-13, 2-16, 2-17 PEAP E Preface xiii problem description 4-1 Product specifications G I

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52

ZyAIR G-200 User’s Guide
Index
I
Index
A
About
.....................................................
2-17
Accessing the ZyAIR Utility
...................
1-3
Ad-hoc Configuration
.................................
A
Automatic WEP key generation
..............
2-8
B
Basic Service Set
.............................
See
BSS
BSS
.....................................................
2-2, A
C
CA
..............................................................
E
Certificate Authority
..........................
See
CA
Communication Problem
.........................
4-1
Ad-hoc(IBSS)
......................................
4-2
Infrastructure
.......................................
4-1
Configuration Utility yersion
................
2-18
Connecting to a Wireless Network
..........
2-5
Copyright
....................................................
ii
Disclaimer
..............................................
ii
Trademarks
.............................................
ii
Customer Support
.....................................
vii
D
Data encryption
.......................................
2-8
Direct Sequence Spread Spectrum
See
DSSS
Disable Windows XP Wireless Support.. 1-1
Disconnecting the ZyAIR from your
computer
..............................................
3-1
Distribution System
...........................
See
DS
DS
...............................................................
B
DSSS
..........................................................
A
E
EAP
.......................................................
2-16
EAP Authentication
....................................
E
MD5
........................................................
E
PEAP
......................................................
E
TLS
.........................................................
E
TTLS
......................................................
E
Encryption
.............................................
2-12
ESS
......................................................
2-2, B
Extended Service Set
.......................
See
ESS
Extensible Authentication Protocol
......
See
EAP
F
Federal Communications Commission
(FCC) Interference Statement
.................
v
FHSS
...........................................................
A
Frequency Hopping Spectrum
......
See
FHSS
I
IBSS
....................................................
2-1, A
IEEE 802.11
................................................
A
Deployment Issues
..................................
C
Security Flaws
........................................
C
IEEE 802.1x
................................................
C
Advantages
.............................................
C
Independent Basic Service Set...A.
See
IBSS
Information for Canadian Users
................
iv
Caution
...................................................
iv
Note
.......................................................
iv
Infrastructure
...........................................
2-2
Infrastructure Configuration
.......................
B
L
Link Info
..................................................
2-3
M
MD5
............................................................
E
Message Digest Algorithm 5
..........
See
MD5
N
Network Topology With RADIUS Server
Example
..................................................
C
Network Type
..........................................
2-1
Ad-Hoc(IBSS)
.....................................
2-1
Infrastructure
.......................................
2-2
O
Online Registration
....................................
iii
Open System
............................................
2-9
Operating Mode
...............
See
Network Type
P
Passphrase
...........
2-8, 2-10, 2-13, 2-16, 2-17
PEAP
..........................................................
E
Preface
.....................................................
xiii
problem description
.................................
4-1
Product specifications
.................................
G