ZyAIR G-100 User’s Guide

Index

About.....................................................

2-19

Information for Canadian Users

................ iv

Accessing the ZyAIR Utility ...................

1-3

Caution...................................................

iv

Ad-hoc Configuration.................................

A

Note .......................................................

iv

Automatic WEP key generation ..............

2-9

Infrastructure ...........................................

2-3

Basic Service Set .............................

See BSS

Infrastructure Configuration .......................

B

Benefits of a Wireless LAN ....................

2-1

Link Info..................................................

2-4

BSS.....................................................

2-3, A

MD5............................................................

E

CA ..............................................................

E

Message Digest Algorithm 5 ..........

See MD5

Certificate Authority..........................

See CA

Network Topology With RADIUS Server

Communication Problem.........................

4-1

Example ..................................................

C

Ad-hoc(IBSS)......................................

4-2

Network Type ..........................................

2-2

Infrastructure .......................................

4-1

Ad-Hoc(IBSS) .....................................

2-2

Configuration Utility yersion ................

2-20

Infrastructure .......................................

2-3

Connecting to a Wireless Network..........

2-6

Notes on WLAN Configuration...............

2-1

Copyright....................................................

ii

Online Registration....................................

iii

Disclaimer ..............................................

ii

Open System..........................................

2-10

Trademarks.............................................

ii

Operating Mode...............

See Network Type

Customer Support.....................................

vii

Passphrase....................

2-9, 2-11, 2-14, 2-17

Data encryption .......................................

2-9

PEAP ..........................................................

E

Direct Sequence Spread SpectrumSee DSSS

Preface .....................................................

xiii

Disable Windows XP Wireless Support.. 1-1

problem description .................................

4-1

Disconnecting the ZyAIR from your

Product specifications.................................

7

computer..............................................

3-1

Protected EAP...............................

See PEAP

Distribution System...........................

See DS

Related Documentation

...........................

xiii

DS...............................................................

B

Remove the ZyAIR Utility ......................

3-1

DSSS ..........................................................

A

RF signals ...................................................

A

EAP .......................................................

2-17

Roaming...................................................

2-3

EAP Authentication....................................

E

Example ...............................................

2-3

MD5........................................................

E

Safely disconnect the ZyAIR...................

3-1

PEAP ......................................................

E

Service Set Identity........................

See SSID

TLS.........................................................

E

Shared Key ............................................

2-10

TTLS ......................................................

E

Site Survey........................................

2-5, 2-6

Encryption .............................................

2-13

SSID ........................................................

2-8

ESS ......................................................

2-3, B

SSID ........................................................

2-2

Extended Service Set.......................

See ESS

Syntax Conventions.................................

xiii

Extensible Authentication Protocol.See EAP

TLS .............................................................

E

Federal Communications Commission

Transmission rate.....................................

2-2

(FCC) Interference Statement..................

v

Transport Layer Security .................

See TLS

FHSS ..........................................................

A

Troubleshooting.......................................

4-1

Frequency Hopping Spectrum.......

See FHSS

Checking Hardware Conflict ...............

4-1

IBSS ...................................................

2-2, A

Communication problems....................

4-1

IEEE 802.11 ...............................................

A

Radio interference................................

4-2

Deployment Issues .................................

C

Starting ZyAIR Utility.........................

4-1

Security Flaws ........................................

C

Using the ZyAIR .................................

4-2

IEEE 802.11g ..........................................

2-1

TTLS...........................................................

E

IEEE 802.1x ...............................................

C

Tunneled Transport Layer Service See TTLS

Advantages .............................................

C

Uninstall the ZyAIR Utility.....................

3-1

Independent Basic Service Set ..A. See IBSS

Upgrade the ZyAIR Utility......................

3-1

Index

G