ZyAIR B-2000 Wireless LAN Gateway with 4-Port Switch

Dynamic Host Configuration Protocol

............ 3-4

Dynamic Service Selection............................

3-10

DYNDNS Wildcard.......................................

2-13

 

E

 

 

EAP..................................................................

 

4-3

EAP Authentication Sequence.........................

4-4

Encapsulation.................................

3-10, 3-12, 5-1

Error Log .........................................................

9-5

Error/Information Messages

 

 

Sample.........................................................

9-5

ESS ...............................

See Extended Service Set

ESS ID ...........................................................

 

3-14

Ethernet..........................................................

3-10

Ethernet Encapsulation ..................................

6-12

Ethernet Traffic..............................................

7-16

Extended Service Set ..........................................

B

External Hub....................................................

2-3

 

F

 

 

FCC....................................................................

 

iii

FHSS...

See Frequency-Hopping Spread Spectrum

Filename Conventions ...................................

10-1

Filter ..............................................................

 

2-17

Applying Filters.........................................

7-15

Ethernet traffic...........................................

7-16

Ethernet Traffic .........................................

7-16

Filter Rules ..................................................

7-5

Filter Structure.............................................

7-3

Generic Filter Rule ....................................

7-11

Remote Node...............................................

5-6

Remote Node Filter .....................................

5-6

Remote Node Filters..................................

7-16

Sample.......................................................

7-14

SUA...........................................................

 

7-12

TCP/IP Filter Rule.......................................

7-6

Filter Log .........................................................

9-6

Filter Rule ........................................................

7-7

Filter Rule Process...........................................

7-2

Filter Rule Setup..............................................

7-6

Filter Rules Summary

 

 

Sample........................................................

7-15

Filter Set

 

 

Class.............................................................

7-6

Filter Set Configuration....................................

7-3

Filtering ....................................................

7-1, 7-6

Fragment Threshold........................................

3-16

Fragmentation Threshold................................

3-15

Frequency-Hopping Spread Spectrum................

A

FTP.................................................................

13-3

Restrictions.................................................

13-3

FTP File Transfer .........................................

10-10

FTP Restrictions .............................................

10-4

FTP Server......................................................

6-19

 

G

 

Gateway............................................................

5-9

General Setup .................................................

2-12

 

H

 

Hidden Menus ................................................

2-10

Hidden Node problem ....................................

3-14

Hop Count ................................................

5-6, 5-9

How PPPoE Works .............................................

J

HTTP..............................................................

6-13

HyperTerminal program.......................

10-6, 10-9

 

I

 

IANA........................................................

3-2, 3-3

IBSS ...............

See Independent Basic Service Set

IEEE 802.11 .......................................................

A

Deployment Issues ..........................................

E

Security Flaws.................................................

E

IEEE 802.11b ...................................................

1-1

IEEE 802.1x .....................................................

1-2

Advantages......................................................

E

IGMP support...................................................

5-6

Independent Basic Service Set ...........................

B

Infrastructure Configuration...............................

B

Initialization......................................................

2-7

Internet access ..................................................

3-1

Internet Access

...... 1-2, 1-4, 2-11, 3-1, 3-11, 3-12

FF

Index