ZyAIR G-200 User’s Guide

A

 

About.....................................................

2-17

Accessing the ZyAIR Utility ...................

1-3

Ad-hoc Configuration.................................

A

Automatic WEP key generation ..............

2-8

B

 

Basic Service Set .............................

See BSS

BSS.....................................................

2-2, A

C

 

CA ..............................................................

E

Certificate Authority..........................

See CA

Communication Problem.........................

4-1

Ad-hoc(IBSS)......................................

4-2

Infrastructure .......................................

4-1

Configuration Utility yersion ................

2-18

Connecting to a Wireless Network..........

2-5

Copyright....................................................

ii

Disclaimer ..............................................

ii

Trademarks.............................................

ii

Customer Support.....................................

vii

D

 

Data encryption .......................................

2-8

Direct Sequence Spread SpectrumSee DSSS Disable Windows XP Wireless Support.. 1-1 Disconnecting the ZyAIR from your

computer..............................................

3-1

Distribution System...........................

See DS

DS...............................................................

B

DSSS ..........................................................

A

E

 

EAP .......................................................

2-16

EAP Authentication....................................

E

MD5........................................................

E

PEAP ......................................................

E

TLS.........................................................

E

TTLS ......................................................

E

Encryption .............................................

2-12

ESS ......................................................

2-2, B

Extended Service Set.......................

See ESS

Extensible Authentication Protocol ......

See EAP

Index

F

Federal Communications Commission

(FCC) Interference Statement

................. v

FHSS...........................................................

A

Frequency Hopping Spectrum ......

See FHSS

I

 

IBSS....................................................

2-1, A

IEEE 802.11................................................

A

Deployment Issues..................................

C

Security Flaws ........................................

C

IEEE 802.1x................................................

C

Advantages .............................................

C

Independent Basic Service Set...

A. See IBSS

Information for Canadian Users ................

iv

Caution...................................................

iv

Note .......................................................

iv

Infrastructure ...........................................

2-2

Infrastructure Configuration .......................

B

L

 

Link Info..................................................

2-3

M

 

MD5............................................................

E

Message Digest Algorithm 5 ..........

See MD5

N

Network Topology With RADIUS Server

Example ..................................................

C

Network Type ..........................................

2-1

Ad-Hoc(IBSS) .....................................

2-1

Infrastructure .......................................

2-2

O

 

 

Online Registration....................................

iii

Open System............................................

2-9

Operating Mode...............

See Network Type

P

 

 

Passphrase...........

2-8, 2-10, 2-13, 2-16, 2-17

PEAP ..........................................................

E

Preface .....................................................

xiii

problem description .................................

4-1

Product specifications.................................

G

Index

I