ZyAIR G-110 User’s Guide

2.8.2

Authentication Mode .........................................................................................................

2-13

2.8.3

IEEE 802.1x.......................................................................................................................

2-13

2.8.4

WPA ..................................................................................................................................

2-13

2.8.5

WPA-PSK Application Example .......................................................................................

2-14

2.8.6

WPA with RADIUS Application Example........................................................................

2-15

2.9

Configuring Wireless Security on the ZyAIR .............................................................................

2-16

2.9.1

WEP Encryption ................................................................................................................

2-17

2.9.2

WPA-PSK..........................................................................................................................

2-19

2.9.3

WPA ..................................................................................................................................

2-20

2.9.4

IEEE802.1x........................................................................................................................

2-22

2.10

The About Screen .......................................................................................................................

2-24

Chapter 3 Maintenance.............................................................................................................................

3-1

3.1

Uninstalling the ZyAIR Utility .....................................................................................................

3-1

3.2

Upgrading the ZyAIR Utility........................................................................................................

3-1

Chapter 4 Troubleshooting.......................................................................................................................

4-1

4.1

Problems Starting the ZyAIR Utility Program.............................................................................

4-1

4.2

Problems Communicating With Other Computers.......................................................................

4-1

4.3

Problem with the Link Status .......................................................................................................

4-2

Appendix A Types of EAP Authentication................................................................................................

A

Appendix B Product Specifications............................................................................................................

C

Index ..............................................................................................................................................................

F

x

Table of Contents