ZyAIR G-220 User’s Guide

A

About ..............................................................

5-1

About the ZyAIR Utility .........................5-1, 5-2

Access point mode ..........................................

1-5

Access Point Mode..........................................

4-1

Additional setup requirements ....................

4-1

Configuration ..............................................

4-4

Link Info .....................................................

4-2

MAC Filter..................................................

4-7

Power saving mode .....................................

4-5

Security .......................................................

4-6

Setup example...............................................

M

Accessing the ZyAIR Utility...........................

1-4

Advanced ........................................................

3-8

Antenna gain ...................................................

4-5

Authentication Mode.......................................

2-6

Auto ............................................................

2-6

Open............................................................

2-6

Shared .........................................................

2-6

Auto authentication mode ...............................

2-6

C

 

Communication Problem

 

Ad-hoc(IBSS) .............................................

6-3

Infrastructure...............................................

6-2

Computer’s IP Address .....................................

A

Configuration ..........................................

3-3, 4-3

Connecting to a Network ................................

3-3

Copyright ...........................................................

ii

Disclaimer ......................................................

ii

Trademarks ....................................................

ii

CTS (Clear to Send .........................................

2-6

Customer Support ............................................

vii

Appendix C

Index

D

 

Data encryption ...............................................

2-4

E

 

ESS..................................................................

2-2

Extended Service Set...............................See ESS

F

 

Federal Communications Commission (FCC)

Interference Statement....................................

v

Model Specific ...............................................

v

Filter MAC address.........................................

4-7

Fragmentation Threshold ................................

2-5

G

 

Graphics Icons Key .........................................

xiv

H

 

Hidden node ....................................................

2-5

I

 

IBSS ................................................................

2-2

Independent Basic Service Set ..............See IBSS

Information for Canadian Users........................

iv

Caution..........................................................

iv

Note...............................................................

iv

M

 

MAC (Media Access Control) ........................

4-6

MAC Filter......................................................

4-6

Index

Q