ZyXEL G-162 User’s Guide

Lightweight Extensible Authentication Protocol

....................................................................

BB

Link Info .........................................................

3-1

M

MD5

................................................................

AA

Message Digest Algorithm 5 ................See MD5

Message Integrity Check ................................

2-6

MIC........................

See Message Integrity Check

N

 

Network Type .................................................

2-2

Ad-Hoc(IBSS) ............................................

2-2

O

 

One-Touch Intelligent Security Technology. 2-10

Online Registration...........................................

iii

Open authentication mode ............................

2-10

OTIST...........................................................

2-10

P

 

passphrase.......................................................

2-5

PEAP ..............................................................

AA

Preface .............................................................

xv

problem description ........................................

5-1

Profile ...........................................................

3-12

Proprietary transmission rates.........................

2-1

Protected EAP......................................See PEAP

R

 

Related Documentation....................................

xv

Roaming..........................................................

2-3

Example ......................................................

2-4

RTS (Request To Send) ..................................

2-9

RTS/CTS handshake.....................................

2-10

RTS/CTS Threshold .......................................

2-9

S

 

Security Settings

 

802.1x .......................................................

3-10

WEP Encryption .........................................

3-6

WPA ...........................................................

3-9

WPA-PSK...................................................

3-8

Security Settings .............................................

3-6

Service Set ......................................................

3-2

Service Set Identity...............................See SSID

Shared authentication mode..........................

2-10

Site Survey......................................................

3-3

SSID.......................................................2-1, 3-15

Syntax Conventions .........................................

xv

T

Temporal Key Integrity Protocol ....................

2-6

The Adapter Screen ......................................

3-21

TKIP ..........See Temporal Key Integrity Protocol

TLS ................................................................

AA

Transmission Speed ......................................

3-22

Transmission Speeds.......................................

2-1

Transport Layer Security .......................See TLS

Trend Chart.....................................................

3-3

Troubleshooting

 

Communication problem with other computers

................................................................

5-2

Troubleshooting ..............................................

5-1

Checking Hardware Conflict ......................

5-1

Communication problems...........................

5-2

Problem with link status..............................

5-2

Radio interference.......................................

5-2

Starting ZyXEL Utility ...............................

5-1

TTLS..............................................................

AA

Tunneled Transport Layer Service.......See TTLS

U

User Authentication ........................................

2-6

Using the ZyAIR Utility .................................

3-1

Using the ZyXEL Utility ................................

2-1

DD

Index