ZyAIR Wireless Gateway Series User’s Guide

4

 

 

4-Port Switch ..................................................

1-2

A

 

 

Address Assignment ...........................

3-11, 3-12

Ad-hoc Configuration ....................................

D-2
Alternative Subnet Mask Notation.................. J-3
Antenna

 

 

Directional..................................................

G-2

Omni-directional ........................................

G-1

Types..........................................................

G-1

Antenna gain ..................................................

G-1

Application-level Firewalls...........................

11-1

Applications ....................................................

1-7

AT command ................................................

28-1

Attack Types .................................................

11-6

Authentication.....................................

21-3, 21-4

auto-negotiation ..............................................

1-2

B

 

 

Backup ..............................................16-11, 28-2

Basic Service Set............................................

D-2

Boot commands ............................................

M-1
Brute-force Attack,........................................11-5

BSS ....................................

See Basic Service Set

Budget Management .....................................

29-2

C

 

 

CA..................................................................

F-1

Call Control...................................................

29-2

Call Filtering .................................................

24-1

Call Filters

 

 

Built-In......................................................

24-1

User-Defined.............................................

24-1

Appendix QIndex

Call History .........................................

29-3, 29-4

Call Scheduling .............................................

31-1

Maximum Number of Schedule Sets

.........31-1

PPPoE........................................................

31-3

Precedence ................................................

31-1

Precedence Example ................

See precedence

CDR ..............................................................

27-7

CDR (Call Detail Record).............................

27-6

Certificate Authority ................................

See CA
Channel ID ............................................6-7, 19-7

CHAP............................................................

21-3

Classes of IP Addresses ..................................

J-1

Collision........................................................

27-2

Command Interpreter ....................................

29-1

Community....................................................

25-1

Computer Name ............................................

18-1

Computer’s IP Address ..................................

C-1
Conditions that prevent TFTP and FTP from

working over WAN...................................

28-4

Configuration ........................................5-2, 16-4

Copyright ...........................................................

ii

Cost Of Transmission..........................

21-6, 21-9

CPU Load......................................................

27-3

Customer Support...............................................

v

D

 

 

Data encryption ...............................................

3-1

Data Filtering ................................................

24-1

DDNS Type...................................................

18-4

Denial of Service...........................................

11-2

Device Filter rules.......................................

24-12

DHCP.....1-5, 3-3, 3-12, 4-3, 5-2, 5-4, 16-4, 27-4

Diagnostic .....................................................

27-8

Diagnostic Tools ...........................................

27-1

Direct Sequence Spread Spectrum .................

D-2

Distribution System........................................

D-3
IndexQ-1