ZyAIR
A |
|
About..................................................... | |
Accessing the ZyAIR Utility ................... | |
A | |
Automatic WEP key generation .............. | |
B |
|
Basic Service Set ............................. | See BSS |
BSS..................................................... | |
C |
|
CA .............................................................. | E |
Certificate Authority.......................... | See CA |
Communication Problem......................... | |
Infrastructure ....................................... | |
Configuration Utility yersion ................ | |
Connecting to a Wireless Network.......... | |
Copyright.................................................... | ii |
Disclaimer .............................................. | ii |
Trademarks............................................. | ii |
Customer Support..................................... | vii |
D |
|
Data encryption ....................................... |
Direct Sequence Spread SpectrumSee DSSS Disable Windows XP Wireless Support..
computer.............................................. | |
Distribution System........................... | See DS |
DS............................................................... | B |
DSSS .......................................................... | A |
E |
|
EAP ....................................................... | |
EAP Authentication.................................... | E |
MD5........................................................ | E |
PEAP ...................................................... | E |
TLS......................................................... | E |
TTLS ...................................................... | E |
Encryption ............................................. | |
ESS ...................................................... | |
Extended Service Set....................... | See ESS |
Extensible Authentication Protocol ...... | See EAP |
Index
F
Federal Communications Commission
(FCC) Interference Statement | ................. v |
FHSS........................................................... | A |
Frequency Hopping Spectrum ...... | See FHSS |
I |
|
IBSS.................................................... | |
IEEE 802.11................................................ | A |
Deployment Issues.................................. | C |
Security Flaws ........................................ | C |
IEEE 802.1x................................................ | C |
Advantages ............................................. | C |
Independent Basic Service Set... | A. See IBSS |
Information for Canadian Users ................ | iv |
Caution................................................... | iv |
Note ....................................................... | iv |
Infrastructure ........................................... | |
Infrastructure Configuration ....................... | B |
L |
|
Link Info.................................................. | |
M |
|
MD5............................................................ | E |
Message Digest Algorithm 5 .......... | See MD5 |
N
Network Topology With RADIUS Server
Example .................................................. | C | |
Network Type .......................................... | ||
Infrastructure ....................................... | ||
O |
|
|
Online Registration.................................... | iii | |
Open System............................................ | ||
Operating Mode............... | See Network Type | |
P |
|
|
Passphrase........... | ||
PEAP .......................................................... | E | |
Preface ..................................................... | xiii | |
problem description ................................. | ||
Product specifications................................. | G |
Index | I |