ZyAIR G-200 User’s Guide
Index
I
Index
A
About
.....................................................
2-17
Accessing the ZyAIR Utility
...................
1-3
Ad-hoc Configuration
.................................
A
Automatic WEP key generation
..............
2-8
B
Basic Service Set
.............................
See
BSS
BSS
.....................................................
2-2, A
C
CA
..............................................................
E
Certificate Authority
..........................
See
CA
Communication Problem
.........................
4-1
Ad-hoc(IBSS)
......................................
4-2
Infrastructure
.......................................
4-1
Configuration Utility yersion
................
2-18
Connecting to a Wireless Network
..........
2-5
Copyright
....................................................
ii
Disclaimer
..............................................
ii
Trademarks
.............................................
ii
Customer Support
.....................................
vii
D
Data encryption
.......................................
2-8
Direct Sequence Spread Spectrum
See
DSSS
Disable Windows XP Wireless Support.. 1-1
Disconnecting the ZyAIR from your
computer
..............................................
3-1
Distribution System
...........................
See
DS
DS
...............................................................
B
DSSS
..........................................................
A
E
EAP
.......................................................
2-16
EAP Authentication
....................................
E
MD5
........................................................
E
PEAP
......................................................
E
TLS
.........................................................
E
TTLS
......................................................
E
Encryption
.............................................
2-12
ESS
......................................................
2-2, B
Extended Service Set
.......................
See
ESS
Extensible Authentication Protocol
......
See
EAP
F
Federal Communications Commission
(FCC) Interference Statement
.................
v
FHSS
...........................................................
A
Frequency Hopping Spectrum
......
See
FHSS
I
IBSS
....................................................
2-1, A
IEEE 802.11
................................................
A
Deployment Issues
..................................
C
Security Flaws
........................................
C
IEEE 802.1x
................................................
C
Advantages
.............................................
C
Independent Basic Service Set...A.
See
IBSS
Information for Canadian Users
................
iv
Caution
...................................................
iv
Note
.......................................................
iv
Infrastructure
...........................................
2-2
Infrastructure Configuration
.......................
B
L
Link Info
..................................................
2-3
M
MD5
............................................................
E
Message Digest Algorithm 5
..........
See
MD5
N
Network Topology With RADIUS Server
Example
..................................................
C
Network Type
..........................................
2-1
Ad-Hoc(IBSS)
.....................................
2-1
Infrastructure
.......................................
2-2
O
Online Registration
....................................
iii
Open System
............................................
2-9
Operating Mode
...............
See
Network Type
P
Passphrase
...........
2-8, 2-10, 2-13, 2-16, 2-17
PEAP
..........................................................
E
Preface
.....................................................
xiii
problem description
.................................
4-1
Product specifications
.................................
G