ZyXEL G-162 User’s Guide

M

MD5

..................................................................

iii

Message Digest Algorithm 5 ................

See MD5

Message Integrity Check ................................

2-6

MIC........................

See Message Integrity Check

N

Network Type .................................................

2-2

Ad-Hoc(IBSS) ............................................

2-2

O

Online Registration...........................................

iii

Open authentication mode ............................

2-10

P

 

passphrase.......................................................

2-5

PEAP ................................................................

iii

Preface ............................................................

xiii

problem description ........................................

5-1

Profile ...........................................................

3-12

Proprietary transmission rates........

1-1, 2-2, 3-22

Protected EAP......................................

See PEAP

R

 

Related Documentation...................................

xiii

Roaming..........................................................

2-3

Example ......................................................

2-4

RTS (Request To Send) ..................................

2-9

RTS/CTS handshake.....................................

2-10

RTS/CTS Threshold .......................................

2-9

S

 

Security Settings

 

802.1x .......................................................

3-10

WEP Encryption .........................................

3-6

WPA ...........................................................

3-9

WPA-PSK...................................................

3-8

Security Settings .............................................

3-6

Service Set ......................................................

3-2

Service Set Identity...............................

See SSID

Shared authentication mode..........................

2-10

Site Survey......................................................

3-3

SSID.......................................................

2-1, 3-15

Syntax Conventions ........................................

xiii

T

Temporal Key Integrity Protocol

....................2-6

The Adapter Screen ......................................

3-21

TKIP ..........

See Temporal Key Integrity Protocol

TLS ...................................................................

iii

Transmission Speed ......................................

3-22

Transmission Speeds.......................................

2-1

Transport Layer Security .......................

See TLS

Trend Chart.....................................................

3-3

Troubleshooting

Communication problem with other computers

................................................................5-2

Troubleshooting ..............................................

5-1

Checking Hardware Conflict ......................

5-1

Communication problems...........................

5-2

Problem with link status..............................

5-2

Radio interference.......................................

5-2

Starting ZyXEL Utility ...............................

5-1

TTLS.................................................................

iii

Tunneled Transport Layer Service.......

See TTLS

U

User Authentication ........................................

2-6

Using the ZyAIR Utility .................................

3-1

Using the ZyXEL Utility ................................

2-1

W

Warranty ...........................................................

iii

Note...............................................................

iii

WEP................................................................

2-5

WEP Data Encryption with.............................

2-5

vi

Index