
ZyXEL
M
MD5 | .................................................................. | iii |
Message Digest Algorithm 5 ................ | See MD5 | |
Message Integrity Check ................................ | ||
MIC........................ | See Message Integrity Check |
N
Network Type ................................................. | |
O
Online Registration........................................... | iii |
Open authentication mode ............................ |
P |
|
passphrase....................................................... | |
PEAP ................................................................ | iii |
Preface ............................................................ | xiii |
problem description ........................................ | |
Profile ........................................................... | |
Proprietary transmission rates........ | |
Protected EAP...................................... | See PEAP |
R |
|
Related Documentation................................... | xiii |
Roaming.......................................................... | |
Example ...................................................... | |
RTS (Request To Send) .................................. | |
RTS/CTS handshake..................................... | |
RTS/CTS Threshold ....................................... | |
S |
|
Security Settings |
|
802.1x ....................................................... | |
WEP Encryption ......................................... | |
WPA ........................................................... | |
Security Settings ............................................. | |
Service Set ...................................................... | |
Service Set Identity............................... | See SSID |
Shared authentication mode.......................... | |
Site Survey...................................................... | |
SSID....................................................... | |
Syntax Conventions ........................................ | xiii |
T
Temporal Key Integrity Protocol | ||
The Adapter Screen ...................................... | ||
TKIP .......... | See Temporal Key Integrity Protocol | |
TLS ................................................................... | iii | |
Transmission Speed ...................................... | ||
Transmission Speeds....................................... | ||
Transport Layer Security ....................... | See TLS | |
Trend Chart..................................................... |
Troubleshooting
Communication problem with other computers
Troubleshooting .............................................. | |
Checking Hardware Conflict ...................... | |
Communication problems........................... | |
Problem with link status.............................. | |
Radio interference....................................... | |
Starting ZyXEL Utility ............................... | |
TTLS................................................................. | iii |
Tunneled Transport Layer Service....... | See TTLS |
U
User Authentication ........................................ | |
Using the ZyAIR Utility ................................. | |
Using the ZyXEL Utility ................................ |
W
Warranty ........................................................... | iii |
Note............................................................... | iii |
WEP................................................................ | |
WEP Data Encryption with............................. |
vi | Index |