ZyXEL Communications 100 manual Spam, Unix, Url, Vpn, Wan

Page 64

 

ZyAIR 100 Wireless PC Card

 

 

 

install traffic or mail filters. Routers are also prone to attacks because they contain a great deal

 

of information about a network.

RTS Threshold

Transmitter contending for the medium may not hear each other. RTS/CTS mechanism can

 

solve this “Hidden Node Problem.” If the packet size is smaller than the preset RTS

 

Threshold size, the RTS/CTS mechanism will not be enabled.

Server

A computer, or a software package, that provides a specific kind of service to client software

 

running on other computers.

Service Set

The SSID indicates the identity of an ESS or IBSS.

Identifier (SSID)

 

Snooping

Passively watching a network for information that could be used to a hacker’s advantage, such

 

as passwords. Usually done while Camping Out.

SPAM

Unwanted email, usually in the form of advertisements.

SSL (Secured

Technology that allows you to send information that only the server can read. SSL allows

Socket Layer)

servers and browsers to encrypt data as they communicate with each other. This makes it very

 

difficult for third parties to understand the communications.

Station (STA)

Any device that contains an IEEE 802.11 conformant medium access control (MAC) and

 

physical layer (PHY) interface to the wireless medium (WM).

Telnet

Telnet is the login and terminal emulation protocol common on the Internet and in UNIX

 

environments. It operates over TCP/IP networks. Its primary function is to allow users to log

 

into remote host systems.

Terminal

A device that allows you to send commands to a computer somewhere else. At a minimum,

 

this usually means a keyboard and a display screen and some simple circuitry.

Terminal

Software that pretends to be (emulates) a physical terminal and allows you to type commands

Emulation

to a computer somewhere else.

Software

 

UNIX

A widely-used operating system in large networks.

URL

(Uniform Resource Locator) URL is an object on the Internet or an intranet that resides on a

 

host system. Objects include directories and an assortment of file types, including text files,

 

graphics, video and audio. A URL is the address of an object that is normally typed in the

 

Address field of a web browser. The URL is basically a pointer to the location of an object.

VPN

Virtual Private Network. These networks use public connections (such as the Internet) to

 

transfer information. That information is usually encrypted for security purposes.

Vulnerability

Point where a system can be attacked.

WAN

Wide Area Networks link geographically dispersed offices in other cities or around the globe.

 

Just about any long-distance communication medium can serve as a WAN link, including

 

switched and permanent telephone circuits, terrestrial radio systems and satellite systems.

Wired

The optional cryptographic confidentiality algorithm specified by IEEE 802.11 used to

Equivalent

provide data confidentiality that is subjectively equivalent to the confidentiality of a wired

Privacy (WEP)

local area network (LAN) medium that does not employ cryptographic techniques to enhance

 

privacy.

Glossary

K

Image 64
Contents ZyAIR ZyAIR Iii Information for Canadian Users ZyXEL Limited Warranty Customer Support Support@zyxel.comTable of Contents Viii List of Figures List of TablesPage About Your ZyAIR PrefaceStructure of this Manual Syntax Conventions Part Page Features of the ZyAIR ZyAIR 100 Wireless PC CardGetting to Know Your ZyAIR Applications for ZyAIR Installing the ZyAIR Hardware InstallationSystem Requirements Inserting the ZyAIR 100 into the Notebook Computer Software Installation Setting Up the ZyAIR 100 for Windows 95 OSR2Software Installation ZyAIR 100 Wireless PC Card ZyAIR 100 Wireless PC Card ZyAIR 100 Wireless PC Card ZyAIR 100 Wireless PC Card Setting Up the ZyAIR 100 for Windows NT ZyAIR 100 Wireless PC Card ZyAIR 100 Wireless PC Card ZyAIR 100 Wireless PC Card ZyAIR 100 Wireless PC Card Setting Up the ZyAIR 100 for Windows Basic Setup Complete Part Page Parameter Configuration Setting Up the ZyAIR 100 UtilityUsing the ZyAIR 100 Utility Main Menu ESS ID Network Type Points RTS ThresholdUse WEP Wired Equivalent Privacy ZyAIR 100 Utility WEP Encryption Screen Frag ThresholdDiagnostic Tools Screen Power SaveDiagnostic Tools Screen Site SurveyDiagnostic Tools Site Survey Screen Link Quality Test Diagnostic Tools Link Quality Test Master Test Station DescriptionDiagnostic Tools Link Quality Test Slave Test Station ZyAIR 100 Wireless PC Card Access Points Browser 10 Diagnostic Tools Access Point Browser ScreenDiagnostic Tools Access Point Browser Screen Menu Fields EssidPage Troubleshooting Problems During InstallationTroubleshooting the Installation of Your ZyAIR Problem Corrective ActionProblems With the Configuration Problems With the Settings for the Access PointTroubleshooting the Configuration Troubleshooting the Settings for the Access PointProblems Communicating With the Computer Troubleshooting Communication ProblemsPage Appendix a Network Configuration Network Configuration Diagram 3 Example of an Effective Transmission Range Hardware Specifications ZyAIR 100 SpecificationsProduct Features Appendix BAppendix C Important Safety Instructions Glossary of Terms BSSFAQ DCEDsss Dram DTEHttp Imts IRC ISP LANMAC NICPcmcia POPPstn PotsRFC Spam UnixURL VPNWlan WWWIndex BSSRTS
Related manuals
Manual 140 pages 8.5 Kb Manual 5 pages 9.28 Kb