Index - ZyXEL Communications ZyXEL ZyAIR G-300 User Manual

Zyxel communications wireless lan pci adapter user's guide g-300
Hide thumbs Also See for ZyXEL ZyAIR G-300:
Table of Contents

Advertisement

About ..................................................... 2-20
Accessing the ZyAIR Utility ..................... 1-2
AdHoc Channel ..................................... 2-11
authentication ........................................ 2-19
authentication mode .............................. 2-14
Authentication Mode................................ 2-6
Open .................................................... 2-6
Shared.................................................. 2-6
automatically key generation ................. 2-15
Basic Service Set ........................... See BSS
BSS.......................................................... 2-2
CA............................................................... Y
certificate ............................................... 2-17
server ................................................. 2-18
user .................................................... 2-17
Certificate Authority .......................... See CA
Certificate Authority (CA)....................... 2-18
Certificate screen, the............................ 2-16
Communication Problem ......................... 4-1
Ad-hoc(IBSS) ....................................... 4-2
Infrastructure........................................ 4-1
Configuration utility version ................... 2-21
Connecting to a Network ....................... 2-20
Copyright ..................................................... ii
Disclaimer ................................................ ii
Trademarks .............................................. ii
CTS (Clear to Send .......................... 2-4, 2-5
Customer Support ..................................... vii

Index

A
B
C
ZyAIR G-300 User's Guide
Data encryption........................................ 2-6
Disable Windows XP Wireless Support... 1-1
EAP Authentication
MD5......................................................... Y
PEAP....................................................... Y
TLS.......................................................... Y
TTLS........................................................ Y
EAP type ................................................ 2-15
encryption .............................................. 2-19
Encryption ................................................ 2-7
encryption method ................................. 2-14
ESS.......................................................... 2-2
Extended Service Set .....................See ESS
Federal Communications Commission
(FCC) Interference Statement..................v
Frag Threshold....................................... 2-13
Fragmentation Threshold......................... 2-4
Frequency domain ................................. 2-21
Graphics Icons Key................................... xiii
Hidden node............................................. 2-4
IBSS......................................................... 2-1
Index
D
E
F
G
H
I
CC

Advertisement

Table of Contents
loading

Table of Contents