ZyAIR
N
Network Configuration Profile ....................... | |
Deleting..................................................... | |
Saving ......................................................... | |
Using a | |
Network Type ................................................. | |
Infrastructure............................................... |
O
Online Registration ........................................... | iii |
Open authentication mode............................. | |
Operating Mode ..................... | See Network Type |
P |
|
passphrase ..................................................... | |
PEAP................................................................. | A |
Preface ............................................................ | xiii |
problem description......................................... | |
Product specifications ....................................... | C |
Profile.............................................................. | |
Network Configuration ............................... | |
Protected EAP...................................... | See PEAP |
R |
|
Related Documentation................................... | xiii |
Roaming.......................................................... | |
Example ...................................................... | |
S |
|
Service Set Identity ............................... | See SSID |
Shared authentication mode .......................... | |
Site Survey.................................................... | |
SSID........................................................ | |
Syntax Conventions ........................................ | xiii |
T
Temporal Key Integrity Protocol .................. | ||
TKIP.......... | See Temporal Key Integrity Protocol | |
TLS ................................................................... | A | |
Transmission rate ............................................ | ||
Transport Layer Security........................ | See TLS | |
Troubleshooting .............................................. | ||
Checking Hardware Conflict....................... | ||
Communication problems ........................... | ||
Radio interference ....................................... | ||
Site Survery................................................. | ||
Starting ZyAIR Utility ................................ | ||
TTLS ................................................................. | A | |
Tunneled Transport Layer Service....... | See TTLS |
U
Upgrading the ZyAIR Utility | |
User Authentication ...................................... | |
Using the ZyAIR Utility.................................. |
V
Viewing Current Configuration ...................... |
W |
|
Warranty............................................................ | iii |
Note............................................................... | iii |
WEP .............................................................. | |
WEP Data Encryption |
|
Configuring ............................................... | |
WEP Data Encryption with ........................... | |
WEP Key....................................................... | |
Wired Equivalent Privacy ..................... | See WEP |
Wireless LAN Parameters |
|
Channel ....................................................... | |
Configuring ................................................. | |
Network Type.............................................. | |
SSID............................................................ | |
Transmission Rate....................................... |
Index | G |