ZyXEL Communications G-220 User Manual

Page of 83
 
 
ZyAIR G-220 User’s Guide 
Index  
xix 
Appendix D     
Index
 
A 
About ..............................................................5-1 
About the ZyXEL Utility ................................5-1 
Access point mode ..........................................1-6 
Access Point Mode..........................................4-1 
Additional setup requirements ....................4-1 
Configuration ..............................................4-4 
Link Info .....................................................4-2 
MAC Filter..................................................4-7 
Power saving mode .....................................4-5 
Setup example.............................................. xv 
Accessing the ZyXEL Utility..........................1-5 
Adapter..........................................................3-17 
Antenna gain ...................................................4-5 
Authentication Mode.......................................2-6 
Auto ............................................................2-6 
Open............................................................2-6 
Shared .........................................................2-6 
Auto authentication mode ...............................2-6 
Automatic WEP key generation......................2-5 
C 
Communication Problem 
Ad-hoc(IBSS) .............................................6-3 
Infrastructure...............................................6-3 
Computer’s IP Address .....................................iii 
Configuration ..................................................4-3 
Connecting to a Network ................................3-6 
Copyright ...........................................................ii 
Disclaimer ......................................................ii 
Trademarks ....................................................ii 
CTS (Clear to Send .........................................2-6 
Customer Support ............................................vii 
D 
Data encryption ...............................................2-4 
E 
ESS..................................................................2-3 
Extended Service Set...............................See ESS 
F 
Federal Communications Commission (FCC) 
Interference Statement....................................v 
Model Specific ...............................................v 
Filter MAC address .........................................4-7 
Fragmentation Threshold ................................2-5 
G 
Graphics Icons Key .........................................xiv 
H 
Hidden node ....................................................2-5 
I 
IBSS ................................................................2-2 
Independent Basic Service Set .............. See IBSS 
Information for Canadian Users........................iv 
Caution ..........................................................iv 
Note...............................................................iv 
L 
Link Info .........................................................3-1