ZyXEL G-360 User’s Guide

A

About ..............................................................

7-1

About the ZyXEL Utility ................................

7-1

Accessing the ZyXEL Utility..........................

1-4

Activating a Profile .......................................

1-14

Add a New Profile...........................................

5-2

Application Overview .....................................

1-2

Authentication Mode.......................................

4-2

Open............................................................

4-2

Shared .........................................................

4-2

Automatic WEP key generation......................

4-2

C

 

CA..................................................................

GG

Certificate Authority ................................

See CA

Communication Problem

 

Ad-hoc(IBSS) .............................................

8-3

Infrastructure...............................................

8-2

Configuration Methods ...................................

1-3

Configuring the Link Info screen....................

2-2

Connecting to a Network ................................

1-5

Copyright ...........................................................

ii

Disclaimer ......................................................

ii

Trademarks ....................................................

ii

Create WEP key with passphrase............

4-5, 4-6

Customer Support ...........................................

8-3

D

 

Data encryption...............................................

4-1

E

 

EAP Authentication

 

MD5 ...........................................................

GG

Appendix F

 

Index

PEAP..........................................................

GG

TLS ............................................................

GG

TTLS ..........................................................

GG

Encryption.......................................................

CC

ESS..................................................................

BB

Extended Service Set...............................

See ESS

F

Federal Communications Commission (FCC) Interference Statement...................................iv

 

G

 

G-plus..............................................................

2-1

Graphics Icons Key .........................................

1-2

 

L

 

LEAP..............................................................

HH

Lightweight Extensible Authentication Protocol

....................................................................

HH

 

M

 

MD5 ...............................................................

GG

Message Digest Algorithm 5.................

See MD5

Message Integrity Check.................................

CC

MIC ........................

See Message Integrity Check

 

N

 

Network Type ................................................

AA

Ad-Hoc(IBSS).....................................

1-3, AA

O

One-Touch Intelligent Security Technology...6-1

Index

II