Contents
v
MacOS 8.6 or 9.x .................................................................................................. C-16
MacOS X ............................................................................................................... C-16
Verifying TCP/IP Properties for Macintosh Computers ......................................... C-17
Verifying the Readiness of Your Internet Account ....................................................... C-17
Are Login Protocols Used? ................................................................................... C-18
What Is Your Configuration Information? .............................................................. C-18
Obtaining ISP Configuration Information for Windows Computers ....................... C-19
Obtaining ISP Configuration Information for Macintosh Computers ..................... C-20
Restarting the Network ................................................................................................ C-20
Appendix D
Wireless Networking Basics .............................................................................................. D-1
Wireless Networking Overview ...................................................................................... D-1
Infrastructure Mode ................................................................................................. D-1
Ad Hoc Mode (Peer-to-Peer Workgroup) ................................................................ D-2
Network Name: Extended Service Set Identification (ESSID) ................................ D-2
Wireless Channels .................................................................................................. D-2
WEP Wireless Security .................................................................................................. D-4
WEP Authentication ................................................................................................ D-4
WEP Open System Authentication ......................................................................... D-5
WEP Shared Key Authentication ............................................................................ D-6
How to Use WEP Parameters ................................................................................. D-8
WPA Wireless Security .................................................................................................. D-8
How Does WPA Compare to WEP? ........................................................................ D-9
How Does WPA Compare to IEEE 802.11i? ........................................................ D-10
What are the Key Features of WPA Security? ...................................................... D-10
Is WPA Perfect? .................................................................................................... D-16
Product Support for WPA ...................................................................................... D-16
Glossary.............................................................................................................................. G-1
Содержание CG814WG V2
Страница 4: ...iv...
Страница 10: ...vi Contents...
Страница 42: ...Reference Manual for the Wireless Cable Modem Gateway CG814WG v2 5 12 Protecting Your Network...
Страница 58: ...Reference Manual for the Wireless Cable Modem Gateway CG814WG v2 7 6 TroubleshootingSoftware Version BNX v1 2...
Страница 60: ...Reference Manual for the Wireless Cable Modem Gateway CG814WG v2 A 2 Technical Specifications...
Страница 80: ...Reference Manual for the Wireless Cable Modem Gateway CG814WG v2 B 20 Networks Routing and Firewall Basics...