
ZyXEL
A
About .............................................................. | |
About the ZyXEL Utility ................................ | |
Accessing the ZyXEL Utility.......................... | |
Activating a Profile ....................................... | |
Add a New Profile........................................... | |
Application Overview ..................................... | |
Authentication Mode....................................... | |
Open............................................................ | |
Shared ......................................................... | |
Automatic WEP key generation...................... |
C |
|
CA.................................................................. | GG |
Certificate Authority ................................ | See CA |
Communication Problem |
|
Infrastructure............................................... | |
Configuration Methods ................................... | |
Configuring the Link Info screen.................... | |
Connecting to a Network ................................ | |
Copyright ........................................................... | ii |
Disclaimer ...................................................... | ii |
Trademarks .................................................... | ii |
Create WEP key with passphrase............ | |
Customer Support ........................................... | |
D |
|
Data encryption............................................... | |
E |
|
EAP Authentication |
|
MD5 ........................................................... | GG |
Appendix F | |
| Index |
PEAP.......................................................... | GG |
TLS ............................................................ | GG |
TTLS .......................................................... | GG |
Encryption....................................................... | CC |
ESS.................................................................. | BB |
Extended Service Set............................... | See ESS |
F
Federal Communications Commission (FCC) Interference Statement...................................iv
| G |
|
Graphics Icons Key ......................................... | ||
| L |
|
LEAP.............................................................. | HH | |
Lightweight Extensible Authentication Protocol | ||
.................................................................... | HH | |
| M |
|
MD5 ............................................................... | GG | |
Message Digest Algorithm 5................. | See MD5 | |
Message Integrity Check................................. | CC | |
MIC ........................ | See Message Integrity Check | |
| N |
|
Network Type ................................................ | AA | |
O
Index | II |