ZyXEL
A
About .............................................................. | |
About the ZyXEL Utility ................................ | |
Accessing the ZyXEL Utility.......................... | |
Add a New Profile......................................... | |
Authentication Mode..................................... | |
Open.......................................................... | |
Shared ....................................................... | |
Automatic WEP key generation...................... |
B |
|
Basic Service Set.................................... | See BSS |
BSS ................................................................. | |
C |
|
CA..................................................................... | iii |
Certificate Authority ................................ | See CA |
Communication Problem |
|
Infrastructure............................................... | |
Connecting to a Network ................................ | |
Copyright ........................................................... | ii |
Disclaimer ...................................................... | ii |
Trademarks .................................................... | ii |
Create WEP key with passphrase... | |
CTS (Clear to Send ......................................... | |
Customer Support ............................................. | vi |
D |
|
Data encryption............................................... |
Appendix C | |
| Index |
| E |
EAP Authentication |
|
MD5 .............................................................. | iii |
PEAP............................................................. | iii |
TLS ............................................................... | iii |
TTLS ............................................................. | iii |
Encryption....................................................... | |
ESS.................................................................. | |
Extended Service Set............................... | See ESS |
F
Federal Communications Commission (FCC)
Interference Statement.................................... | v |
Model Specific ............................................... | v |
Fragmentation Threshold ................................ |
G |
|
Graphics Icons Key ......................................... | xiv |
H |
|
Hidden node .................................................... | |
I |
|
IBSS ................................................................ | |
Independent Basic Service Set .............. | See IBSS |
Information for Canadian Users........................ | iv |
Caution.......................................................... | iv |
Note............................................................... | iv |
L |
|
Link Info ......................................................... |
Index | v |