ZyXEL G-300 User Guide - Page 72

ZyXEL G-300 Manual

Page 72 highlights

ZyAIR G-300 User's Guide IEEE 802.1X 2-15 IEEE 802.1X authentication 2-15 Independent Basic Service Set......See IBSS Information for Canadian Users iv Caution iv Note iv Infrastructure 2-2 L Link quality 2-11 Link strength 2-12 M MD5 Y Message Digest Algorithm 5.......... See MD5 Message Integrity Check 2-7 MIC See Message Integrity Check N Network driver version 2-21 Network Type 2-1 Ad-Hoc(IBSS 2-1 Infrastructure 2-2 NIC firmware version 2-21 Nitro Time 2-13 O Online Registration iii Open authentication mode 2-6 Operating Mode See Network Type P PEAP Y power save 2-12 Preface xiii Pre-Shared Key (PSK 2-15 problem description 4-1 DD Product specifications AA profile 2-10 Protected EAP See PEAP R radio frequency 2-1 Related Documentation xiii Roaming 2-3 Example 2-3 RTS (Request To Send 2-4, 2-5 RTS Threshold 2-4, 2-13 RTS/CTS handshake 2-5 S Security screen, the 2-13 Service Set Identity See SSID Shared authentication mode 2-6 Site Survey 2-18, 2-19 SSID 2-1, 2-11, 2-19 State 2-11 Syntax Conventions xiii T Temporal Key Integrity Protocol 2-7 Threshold 2-13 Throughput 2-11 TKIP .... See Temporal Key Integrity Protocol TLS Y Transmission rate 2-1 Transmission rates 2-11 Transmission speeds 2-11 Transport Layer Security See TLS Troubleshooting 4-1 Checking Hardware Conflict 4-1 Communication problems 4-1 Radio interference 4-2 Starting ZyAIR Utility 4-1 TTLS Y Tunneled Transport Layer Service See TTLS Index

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73

ZyAIR G-300 User’s Guide
DD
Index
IEEE 802.1X
..........................................
2-15
IEEE 802.1X authentication
...................
2-15
Independent Basic Service Set
......
See
IBSS
Information for Canadian Users
..................
iv
Caution
....................................................
iv
Note
.........................................................
iv
Infrastructure
............................................
2-2
L
Link quality
.............................................
2-11
Link strength
..........................................
2-12
M
MD5
............................................................
Y
Message Digest Algorithm 5
..........
See
MD5
Message Integrity Check
.........................
2-7
MIC
................
See
Message Integrity Check
N
Network driver version
...........................
2-21
Network Type
...........................................
2-1
Ad-Hoc(IBSS)
.......................................
2-1
Infrastructure
........................................
2-2
NIC firmware version
.............................
2-21
Nitro Time
..............................................
2-13
O
Online Registration
.....................................
iii
Open authentication mode
.......................
2-6
Operating Mode
...............
See
Network Type
P
PEAP
..........................................................
Y
power save
.............................................
2-12
Preface
......................................................
xiii
Pre-Shared Key (PSK)
...........................
2-15
problem description
.................................
4-1
Product specifications
..............................
AA
profile
.....................................................
2-10
Protected EAP
..............................
See
PEAP
R
radio frequency
........................................
2-1
Related Documentation
............................
xiii
Roaming
...................................................
2-3
Example
................................................
2-3
RTS (Request To Send)
...................
2-4, 2-5
RTS Threshold
................................
2-4, 2-13
RTS/CTS handshake
...............................
2-5
S
Security screen, the
...............................
2-13
Service Set Identity
.......................
See
SSID
Shared authentication mode
....................
2-6
Site Survey
....................................
2-18, 2-19
SSID
.......................................
2-1, 2-11, 2-19
State
.......................................................
2-11
Syntax Conventions
..................................
xiii
T
Temporal Key Integrity Protocol
...............
2-7
Threshold
...............................................
2-13
Throughput
.............................................
2-11
TKIP
....
See
Temporal Key Integrity Protocol
TLS
..............................................................
Y
Transmission rate
.....................................
2-1
Transmission rates
.................................
2-11
Transmission speeds
.............................
2-11
Transport Layer Security
.................
See TLS
Troubleshooting
.......................................
4-1
Checking Hardware Conflict
.................
4-1
Communication problems
.....................
4-1
Radio interference
................................
4-2
Starting ZyAIR Utility
............................
4-1
TTLS
...........................................................
Y
Tunneled Transport Layer Service
See
TTLS