ZyAIR G-160 User’s Guide

4

4x ..................................................................2-14

A

About ............................................................

2-27

Accessing the ZyAIR Utility...........................

1-4

Authentication Mode.......................................

2-7

Auto ............................................................

2-7

Shared .........................................................

2-7

Auto authentication mode ...............................

2-7

B

 

Basic Service Set....................................

See BSS

BSS .................................................................

2-2

C

 

CA.....................................................................

iii

Certificate Authority ................................

See CA

Communication Problem ................................

4-1

Ad-hoc(IBSS) .............................................

4-2

Infrastructure...............................................

4-2

Configuration utility version.........................

2-28

Connecting to a Network ..............................

2-12

Copyright ...........................................................

ii

Disclaimer ......................................................

ii

Trademarks ....................................................

ii

CTS (Clear to Send .................................

2-4, 2-5

Customer Support ............................................

vii

D

 

Data encryption...............................................

2-6

Disable Windows XP Wireless Support..........

1-1

 

Index

 

E

 

EAP Authentication

 

 

MD5 ..............................................................

iii

PEAP.............................................................

iii

TLS ...............................................................

iii

TTLS .............................................................

iii

Encryption.......................................................

2-8

ESS..................................................................

2-3

Extended Service Set...............................

See ESS

External Configuration..................................

2-11

 

F

 

Federal Communications Commission (FCC)

Interference Statement....................................

v

Frag Threshold ..............................................

2-16

Fragmentation Threshold ................................

2-4

 

H

 

Hidden node ....................................................

2-5

 

I

 

IBSS ................................................................

2-2

Independent Basic Service Set ..............

See IBSS

Information for Canadian Users........................

iv

Caution..........................................................

iv

Note...............................................................

iv

Infrastructure...................................................

2-2

 

M

 

MD5 ..................................................................

iii

Message Digest Algorithm 5.................

See MD5

Message Integrity Check.................................

2-8

MIC ........................

See Message Integrity Check

Index

v