ZyAIR
Table of Contents
Federal Communications Commission (FCC) Interference Statement | ||
OVERVIEW..................................................................................................................................................... | I | |
Chapter 1 Getting to Know Your ZyAIR................................................................................................... | ||
1.1 | Introducing the ZyAIR............................................................................................................... | |
1.2 | ZyAIR Features.......................................................................................................................... | |
1.3 | Applications for the ZyAIR ....................................................................................................... | |
1.3.1 | Infrastructure...................................................................................................................... | |
1.3.2 | Ad Hoc............................................................................................................................... | |
1.3.3 | Bridge ................................................................................................................................ | |
Chapter 2 Introducing the Web Configurator .......................................................................................... | ||
2.1 | Accessing the ZyAIR Web Configurator................................................................................... | |
2.2 | Navigating the ZyAIR Web Configurator.................................................................................. | |
2.3 | Resetting the ZyAIR .................................................................................................................. | |
2.3.1 | Method of Restoring | |
SYSTEM, WIRELESS AND IP.................................................................................................................... | II | |
Chapter 3 System Screens ........................................................................................................................... | ||
3.1 | System Overview....................................................................................................................... | |
3.2 | Configuring General Setup ........................................................................................................ | |
3.3 | Configuring Password................................................................................................................ | |
3.4 | Configuring Time Setting .......................................................................................................... | |
Chapter 4 Wireless LAN ............................................................................................................................. | ||
4.1 | Wireless LAN Basis................................................................................................................... | |
4.1.1 | Channel .............................................................................................................................. | |
4.1.2 | ESS ID ............................................................................................................................... | |
4.1.3 | WEP Encryption ................................................................................................................ | |
4.1.4 | RTS/CTS............................................................................................................................ | |
4.1.5 | Fragmentation Threshold ................................................................................................... | |
4.2 | Wireless Security Overview....................................................................................................... | |
4.3 | WEP Overview .......................................................................................................................... | |
4.3.1 | Data Encryption ................................................................................................................. | |
4.3.2 | Authentication.................................................................................................................... | |
4.4 | Configuring Wireless................................................................................................................. | |
4.4.1 | Infrastructure...................................................................................................................... |
vi | Table of Contents |