ZyAIR G-160 User’s Guide

N

 

Network driver version .................................

2-28

Network Type .................................................

2-2

Ad-Hoc(IBSS) ............................................

2-2

Infrastructure...............................................

2-2

NIC firmware version ...................................

2-29

O

 

Online Registration...........................................

iii

Open authentication mode ..............................

2-7

P

 

Packet Burst..................................................

2-14

PEAP ................................................................

iii

Preamble Mode...............................................

2-7

Preface ............................................................

xiii

problem description ........................................

4-1

Product specifications.........................................

i

Proprietary transmission rates.......................

2-15

Protected EAP......................................

See PEAP

R

 

Related Documentation...................................

xiii

Roaming..........................................................

2-3

Example ......................................................

2-4

RTS (Request To Send) ...........................

2-4, 2-5

RTS Threshold.......................................

2-5, 2-16

RTS/CTS handshake.......................................

2-5

S

 

Service Set Identity...............................

See SSID

Shared authentication mode............................

2-7

Site Survey....................................................

2-26

SSID ......................................................

2-1, 2-13

State ..............................................................

2-11

Syntax Conventions ........................................

xiii

T

Temporal Key Integrity Protocol ....................

2-8

Threshold

......................................................

2-16

TKIP ..........

See Temporal Key Integrity Protocol

TLS ...................................................................

iii

Transmission rate............................................

2-1

Transmission rates ........................................

2-14

Transmission speeds .....................................

2-14

Transport Layer Security .......................

See TLS

Troubleshooting ..............................................

4-1

Checking Hardware Conflict ......................

4-1

Communication problems...........................

4-1

Radio interference.......................................

4-2

Starting ZyAIR Utility ................................

4-1

TTLS.................................................................

iii

Tunneled Transport Layer Service.......

See TTLS

U

Upgrading the ZyAIR Utility..........................

3-1

User Authentication ........................................

2-8

Using the ZyAIR Utility .................................

2-1

W

 

Warranty ...........................................................

iii

Note...............................................................

iii

WEP................................................................

2-6

WEP Data Encryption

 

Configuring...............................................

2-19

WEP Data Encryption with.............................

2-6

WEP Key ........................................................

2-6

Windows XP Zero Configuration ...................

1-1

Wired Equivalent Privacy .....................

See WEP

Wireless LAN Parameters

 

Channel .......................................................

2-1

Configuring...............................................

2-10

Network Type .............................................

2-2

SSID............................................................

2-1

Transmission Rate.......................................

2-1

Wireless LAN Security

 

vi

Index