ZyXEL Communications zyair g-160 User Manual
ZyAIR G-160 User’s Guide
Index
v
Index
4
4x ..................................................................2-14
A
About ............................................................2-27
Accessing the ZyAIR Utility...........................1-4
Authentication Mode.......................................2-7
Accessing the ZyAIR Utility...........................1-4
Authentication Mode.......................................2-7
Auto ............................................................2-7
Shared .........................................................2-7
Shared .........................................................2-7
Auto authentication mode ...............................2-7
B
Basic Service Set.................................... See BSS
BSS .................................................................2-2
BSS .................................................................2-2
C
CA.....................................................................iii
Certificate Authority ................................ See CA
Communication Problem ................................4-1
Certificate Authority ................................ See CA
Communication Problem ................................4-1
Ad-hoc(IBSS) .............................................4-2
Infrastructure...............................................4-2
Infrastructure...............................................4-2
Configuration utility version .........................2-28
Connecting to a Network ..............................2-12
Copyright ...........................................................ii
Connecting to a Network ..............................2-12
Copyright ...........................................................ii
Disclaimer ......................................................ii
Trademarks ....................................................ii
Trademarks ....................................................ii
CTS (Clear to Send ................................. 2-4, 2-5
Customer Support ............................................vii
Customer Support ............................................vii
D
Data encryption...............................................2-6
Disable Windows XP Wireless Support..........1-1
Disable Windows XP Wireless Support..........1-1
E
EAP Authentication
MD5 ..............................................................iii
PEAP.............................................................iii
TLS ...............................................................iii
TTLS .............................................................iii
PEAP.............................................................iii
TLS ...............................................................iii
TTLS .............................................................iii
Encryption.......................................................2-8
ESS..................................................................2-3
Extended Service Set...............................See ESS
External Configuration..................................2-11
ESS..................................................................2-3
Extended Service Set...............................See ESS
External Configuration..................................2-11
F
Federal Communications Commission (FCC)
Interference Statement....................................v
Frag Threshold ..............................................2-16
Fragmentation Threshold ................................2-4
Fragmentation Threshold ................................2-4
H
Hidden node ....................................................2-5
I
IBSS ................................................................2-2
Independent Basic Service Set .............. See IBSS
Information for Canadian Users........................iv
Independent Basic Service Set .............. See IBSS
Information for Canadian Users........................iv
Caution ..........................................................iv
Note...............................................................iv
Note...............................................................iv
Infrastructure...................................................2-2
M
MD5 ..................................................................iii
Message Digest Algorithm 5................. See MD5
Message Integrity Check.................................2-8
MIC ........................See Message Integrity Check
Message Digest Algorithm 5................. See MD5
Message Integrity Check.................................2-8
MIC ........................See Message Integrity Check