ZyXEL Communications G-220 Manuel D’Utilisation
ZyAIR G-220 User’s Guide
Index
xix
Appendix D
Index
A
About ..............................................................5-1
About the ZyXEL Utility ................................5-1
Access point mode ..........................................1-6
Access Point Mode..........................................4-1
About the ZyXEL Utility ................................5-1
Access point mode ..........................................1-6
Access Point Mode..........................................4-1
Additional setup requirements ....................4-1
Configuration ..............................................4-4
Link Info .....................................................4-2
MAC Filter..................................................4-7
Power saving mode .....................................4-5
Setup example.............................................. xv
Configuration ..............................................4-4
Link Info .....................................................4-2
MAC Filter..................................................4-7
Power saving mode .....................................4-5
Setup example.............................................. xv
Accessing the ZyXEL Utility..........................1-5
Adapter..........................................................3-17
Antenna gain ...................................................4-5
Authentication Mode.......................................2-6
Adapter..........................................................3-17
Antenna gain ...................................................4-5
Authentication Mode.......................................2-6
Auto ............................................................2-6
Open............................................................2-6
Shared .........................................................2-6
Open............................................................2-6
Shared .........................................................2-6
Auto authentication mode ...............................2-6
Automatic WEP key generation......................2-5
Automatic WEP key generation......................2-5
C
Communication Problem
Ad-hoc(IBSS) .............................................6-3
Infrastructure...............................................6-3
Infrastructure...............................................6-3
Computer’s IP Address .....................................iii
Configuration ..................................................4-3
Connecting to a Network ................................3-6
Copyright ...........................................................ii
Configuration ..................................................4-3
Connecting to a Network ................................3-6
Copyright ...........................................................ii
Disclaimer ......................................................ii
Trademarks ....................................................ii
Trademarks ....................................................ii
CTS (Clear to Send .........................................2-6
Customer Support ............................................vii
Customer Support ............................................vii
D
Data encryption ...............................................2-4
E
ESS..................................................................2-3
Extended Service Set...............................See ESS
Extended Service Set...............................See ESS
F
Federal Communications Commission (FCC)
Interference Statement....................................v
Model Specific ...............................................v
Model Specific ...............................................v
Filter MAC address .........................................4-7
Fragmentation Threshold ................................2-5
Fragmentation Threshold ................................2-5
G
Graphics Icons Key .........................................xiv
H
Hidden node ....................................................2-5
I
IBSS ................................................................2-2
Independent Basic Service Set .............. See IBSS
Information for Canadian Users........................iv
Independent Basic Service Set .............. See IBSS
Information for Canadian Users........................iv
Caution ..........................................................iv
Note...............................................................iv
Note...............................................................iv
L
Link Info .........................................................3-1