ZyXEL Communications ZyAIR G-220 User Manual

Page of 67
 
 
ZyAIR G-220 User’s Guide 
Index  
Appendix C     
Index
 
A 
About ..............................................................5-1 
About the ZyAIR Utility ......................... 5-1, 5-2 
Access point mode ..........................................1-5 
Access Point Mode..........................................4-1 
Additional setup requirements ....................4-1 
Configuration ..............................................4-4 
Link Info .....................................................4-2 
MAC Filter..................................................4-7 
Power saving mode .....................................4-5 
Security .......................................................4-6 
Setup example...............................................M 
Accessing the ZyAIR Utility...........................1-4 
Advanced ........................................................3-8 
Antenna gain ...................................................4-5 
Authentication Mode.......................................2-6 
Auto ............................................................2-6 
Open............................................................2-6 
Shared .........................................................2-6 
Auto authentication mode ...............................2-6 
C 
Communication Problem 
Ad-hoc(IBSS) .............................................6-3 
Infrastructure...............................................6-2 
Computer’s IP Address ..................................... A 
Configuration .......................................... 3-3, 4-3 
Connecting to a Network ................................3-3 
Copyright ...........................................................ii 
Disclaimer ......................................................ii 
Trademarks ....................................................ii 
CTS (Clear to Send .........................................2-6 
Customer Support ............................................vii 
D 
Data encryption ...............................................2-4 
E 
ESS..................................................................2-2 
Extended Service Set...............................See ESS 
F 
Federal Communications Commission (FCC) 
Interference Statement....................................v 
Model Specific ...............................................v 
Filter MAC address .........................................4-7 
Fragmentation Threshold ................................2-5 
G 
Graphics Icons Key .........................................xiv 
H 
Hidden node ....................................................2-5 
I 
IBSS ................................................................2-2 
Independent Basic Service Set .............. See IBSS 
Information for Canadian Users........................iv 
Caution..........................................................iv 
Note...............................................................iv 
M 
MAC (Media Access Control) ........................4-6 
MAC Filter......................................................4-6