ZyXEL Communications Corporation B320 User Manual
ZyAIR Wireless LAN Utility
Index
C
Index
A
About ............................................................2-17
Accessing the ZyAIR Utility...........................1-3
Authentication Mode.....................................2-15
Accessing the ZyAIR Utility...........................1-3
Authentication Mode.....................................2-15
Auto ..........................................................2-15
Open..........................................................2-15
Shared .......................................................2-15
Open..........................................................2-15
Shared .......................................................2-15
Auto authentication mode .............................2-15
Automatic WEP key generation....................2-11
Automatic WEP key generation....................2-11
C
Communication Problem ................................4-2
Ad-hoc(IBSS) .............................................4-2
Infrastructure...............................................4-2
Infrastructure...............................................4-2
Connecting to a Network ..............................2-10
Copyright ...........................................................ii
Copyright ...........................................................ii
Disclaimer ......................................................ii
Trademarks ....................................................ii
Trademarks ....................................................ii
Create with Passphrase..................................2-12
CTS (Clear to Send .......................................2-15
Customer Support ............................................vii
CTS (Clear to Send .......................................2-15
Customer Support ............................................vii
D
Data encryption.............................................2-11
E
ESS..................................................................2-2
Extended Service Set ..............................See ESS
Extended Service Set ..............................See ESS
F
Federal Communications Commission (FCC)
Interference Statement ................................... v
Fragmentation Threshold ..............................2-14
H
Hidden node ..................................................2-14
I
IBSS ................................................................2-2
Independent Basic Service Set .............. See IBSS
Information for Canadian Users........................iv
Independent Basic Service Set .............. See IBSS
Information for Canadian Users........................iv
Caution ..........................................................iv
Note...............................................................iv
Note...............................................................iv
L
Link Info .........................................................2-4
M
Manual Entry.................................................2-13
N
Network Type .................................................2-2
Ad-Hoc(IBSS).............................................2-2
O
Online Registration ...........................................iii
Open authentication mode.............................2-15
Operating Mode ..................... See Network Type
Open authentication mode.............................2-15
Operating Mode ..................... See Network Type
P
passphrase .....................................................2-11
Passphrase .....................................................2-13
Power Saving Mode ........................................2-8
Preamble Mode .............................................2-15
Preface.............................................................xiii
problem description.........................................4-1
Passphrase .....................................................2-13
Power Saving Mode ........................................2-8
Preamble Mode .............................................2-15
Preface.............................................................xiii
problem description.........................................4-1