ZyAIR
2.8.2 | Authentication Mode ......................................................................................................... | |
2.8.3 | IEEE 802.1x....................................................................................................................... | |
2.8.4 | WPA .................................................................................................................................. | |
2.8.5 | ||
2.8.6 | WPA with RADIUS Application Example........................................................................ | |
2.9 | Configuring Wireless Security on the ZyAIR ............................................................................. | |
2.9.1 | WEP Encryption ................................................................................................................ | |
2.9.2 | ||
2.9.3 | WPA .................................................................................................................................. | |
2.9.4 | IEEE802.1x........................................................................................................................ | |
2.10 | The About Screen ....................................................................................................................... | |
Chapter 3 Maintenance............................................................................................................................. | ||
3.1 | Uninstalling the ZyAIR Utility ..................................................................................................... | |
3.2 | Upgrading the ZyAIR Utility........................................................................................................ | |
Chapter 4 Troubleshooting....................................................................................................................... | ||
4.1 | Problems Starting the ZyAIR Utility Program............................................................................. | |
4.2 | Problems Communicating With Other Computers....................................................................... | |
4.3 | Problem with the Link Status ....................................................................................................... | |
Appendix A Types of EAP Authentication................................................................................................ | A | |
Appendix B Product Specifications............................................................................................................ | C | |
Index .............................................................................................................................................................. | F |
x | Table of Contents |