ZyXEL G-162 User’s Guide

A

About ..............................................................

4-1

About the ZyXEL Utility ................................

4-1

Accessing the ZyXEL Utility..........................

1-2

Add a New Profile.........................................

3-14

Authentication Mode.....................................

2-10

Open..........................................................

2-10

Shared .......................................................

2-10

Automatic WEP key generation......................

2-5

B

 

Basic Service Set....................................

See BSS

BSS .................................................................

2-2

C

 

CA..................................................................

AA

Certificate Authority ................................

See CA

Communication Problem

 

Ad-hoc(IBSS) .............................................

5-3

Infrastructure...............................................

5-2

Connecting to a Network ................................

3-5

Copyright ...........................................................

ii

Disclaimer ......................................................

ii

Trademarks ....................................................

ii

Create WEP key with passphrase...

3-8, 3-9, 3-11

CTS (Clear to Send .........................................

2-9

Customer Support ...........................................

viii

D

 

Data encryption...............................................

2-5

Appendix E

 

Index

 

E

EAP Authentication

 

MD5 ...........................................................

AA

PEAP..........................................................

AA

TLS ............................................................

AA

TTLS ..........................................................

AA

Encryption.......................................................

2-6

ESS..................................................................

2-3

Extended Service Set...............................

See ESS

F

Federal Communications Commission (FCC)

Interference Statement....................................

v

Model Specific ...............................................

v

Fragmentation Threshold ................................

2-8

G

 

Graphics Icons Key .........................................

xvi

H

 

Hidden node ....................................................

2-9

I

 

IBSS ................................................................

2-2

Independent Basic Service Set ..............

See IBSS

Information for Canadian Users........................

iv

Caution..........................................................

iv

Note...............................................................

iv

L

 

LEAP...............................................................

BB

Index

CC