ZyXEL Communications ZYAIR G-162 User Manual page 93

802.11g wireless cardbus card
Hide thumbs Also See for ZYAIR G-162:
Table of Contents

Advertisement

About ..............................................................7-1
About the ZyXEL Utility ................................7-1
Accessing the ZyXEL Utility..........................1-4
Activating a Profile .......................................1-14
Add a New Profile...........................................5-2
Application Overview .....................................1-2
Authentication Mode.......................................4-2
Open............................................................4-2
Shared .........................................................4-2
Automatic WEP key generation......................4-2
CA.................................................................. GG
Certificate Authority ................................ See CA
Communication Problem
Ad-hoc(IBSS) .............................................8-3
Infrastructure...............................................8-2
Configuration Methods ...................................1-3
Configuring the Link Info screen....................2-2
Connecting to a Network ................................1-5
Copyright ...........................................................ii
Disclaimer ......................................................ii
Trademarks ....................................................ii
Create WEP key with passphrase............ 4-5, 4-6
Customer Support ...........................................8-3
Data encryption...............................................4-1
EAP Authentication
MD5 ........................................................... GG
Index
A
C
D
E
ZyXEL G-162 User's Guide
Appendix F
PEAP.......................................................... GG
TLS ............................................................ GG
TTLS .......................................................... GG
Encryption.......................................................CC
ESS..................................................................BB
Extended Service Set...............................See ESS
Federal Communications Commission (FCC)
Interference Statement...................................iv
G-plus..............................................................2-1
Graphics Icons Key .........................................1-2
LEAP.............................................................. HH
Lightweight Extensible Authentication Protocol
.................................................................... HH
MD5 ............................................................... GG
Message Digest Algorithm 5................. See MD5
Message Integrity Check.................................CC
MIC ........................See Message Integrity Check
Network Type ................................................ AA
Ad-Hoc(IBSS).....................................1-3, AA
One-Touch Intelligent Security Technology ...6-1
Index
F
G
L
M
N
O
II

Advertisement

Table of Contents
loading

Table of Contents