ZyAIR G-110 User’s Guide

N

Network Configuration Profile .......................

2-9

Deleting.....................................................

2-10

Saving .........................................................

2-9

Using a pre-configured profile ..................

2-10

Network Type .................................................

2-2

Ad-Hoc(IBSS).............................................

2-2

Infrastructure...............................................

2-2

O

Online Registration ...........................................

iii

Open authentication mode.............................

2-13

Operating Mode .....................

See Network Type

P

 

passphrase .....................................................

2-12

PEAP.................................................................

A

Preface ............................................................

xiii

problem description.........................................

4-1

Product specifications .......................................

C

Profile..............................................................

2-9

Network Configuration ...............................

2-9

Protected EAP......................................

See PEAP

R

 

Related Documentation...................................

xiii

Roaming..........................................................

2-3

Example ......................................................

2-4

S

 

Service Set Identity ...............................

See SSID

Shared authentication mode ..........................

2-13

Site Survey....................................................

2-10

SSID........................................................

2-1, 2-7

Syntax Conventions ........................................

xiii

T

Temporal Key Integrity Protocol ..................

2-14

TKIP..........

See Temporal Key Integrity Protocol

TLS ...................................................................

A

Transmission rate ............................................

2-1

Transport Layer Security........................

See TLS

Troubleshooting ..............................................

4-1

Checking Hardware Conflict.......................

4-1

Communication problems ...........................

4-1

Radio interference .......................................

4-2

Site Survery.................................................

4-2

Starting ZyAIR Utility ................................

4-1

TTLS .................................................................

A

Tunneled Transport Layer Service.......

See TTLS

U

Upgrading the ZyAIR Utility

..........................3-1

User Authentication ......................................

2-13

Using the ZyAIR Utility..................................

2-1

V

Viewing Current Configuration ......................

2-4

W

 

Warranty............................................................

iii

Note...............................................................

iii

WEP ..............................................................

2-12

WEP Data Encryption

 

Configuring ...............................................

2-16

WEP Data Encryption with ...........................

2-12

WEP Key.......................................................

2-12

Wired Equivalent Privacy .....................

See WEP

Wireless LAN Parameters

 

Channel .......................................................

2-1

Configuring .................................................

2-6

Network Type..............................................

2-2

SSID............................................................

2-1

Transmission Rate.......................................

2-1

Index

G