ZyAIR G-100 User’s Guide
Index
G
Index
About..................................................... 2-19
Accessing the ZyAIR Utility ................... 1-3
Ad-hoc Configuration.................................A
Automatic WEP key generation .............. 2-9
Basic Service Set .............................
See
BSS
Benefits of a Wireless LAN .................... 2-1
BSS..................................................... 2-3, A
CA .............................................................. E
Certificate Authority..........................
See
CA
Communication Problem......................... 4-1
Ad-hoc(IBSS)...................................... 4-2
Infrastructure ....................................... 4-1
Configuration Utility yersion ................ 2-20
Connecting to a Wireless Network.......... 2-6
Copyright.................................................... ii
Disclaimer .............................................. ii
Trademarks............................................. ii
Customer Support..................................... vii
Data encryption ....................................... 2-9
Direct Sequence Spread Spectrum
See
DSSS
Disable Windows XP Wireless Support.. 1-1
Disconnecting the ZyAIR from your
computer.............................................. 3-1
Distribution System...........................
See
DS
DS............................................................... B
DSSS ..........................................................A
EAP ....................................................... 2-17
EAP Authentication.................................... E
MD5........................................................ E
PEAP ...................................................... E
TLS......................................................... E
TTLS ...................................................... E
Encryption ............................................. 2-13
ESS ......................................................2-3, B
Extended Service Set.......................
See
ESS
Extensible Authentication Protocol.
See
EAP
Federal Communications Commission
(FCC) Interference Statement..................v
FHSS ..........................................................A
Frequency Hopping Spectrum.......
See
FHSS
IBSS ................................................... 2-2, A
IEEE 802.11 ...............................................A
Deployment Issues ................................. C
Security Flaws ........................................ C
IEEE 802.11g .......................................... 2-1
IEEE 802.1x ............................................... C
Advantages ............................................. C
Independent Basic Service Set ..A.
See
IBSS
Information for Canadian Users ................ iv
Caution................................................... iv
Note ....................................................... iv
Infrastructure ........................................... 2-3
Infrastructure Configuration .......................B
Link Info .................................................. 2-4
MD5............................................................ E
Message Digest Algorithm 5 ..........
See
MD5
Network Topology With RADIUS Server
Example ..................................................C
Network Type .......................................... 2-2
Ad-Hoc(IBSS) ..................................... 2-2
Infrastructure ....................................... 2-3
Notes on WLAN Configuration............... 2-1
Online Registration.................................... iii
Open System.......................................... 2-10
Operating Mode...............
See
Network Type
Passphrase.................... 2-9, 2-11, 2-14, 2-17
PEAP .......................................................... E
Preface ..................................................... xiii
problem description ................................. 4-1
Product specifications................................. 7
Protected EAP...............................
See
PEAP
Related Documentation ........................... xiii
Remove the ZyAIR Utility ...................... 3-1
RF signals ...................................................A
Roaming................................................... 2-3
Example ............................................... 2-3
Safely disconnect the ZyAIR................... 3-1
Service Set Identity........................
See
SSID
Shared Key ............................................ 2-10
Site Survey........................................2-5, 2-6
SSID ........................................................ 2-8
SSID ........................................................ 2-2
Syntax Conventions................................. xiii
TLS ............................................................. E
Transmission rate..................................... 2-2
Transport Layer Security .................
See
TLS
Troubleshooting....................................... 4-1
Checking Hardware Conflict ............... 4-1
Communication problems.................... 4-1
Radio interference................................ 4-2
Starting ZyAIR Utility......................... 4-1
Using the ZyAIR ................................. 4-2
TTLS........................................................... E
Tunneled Transport Layer Service
See
TTLS
Uninstall the ZyAIR Utility ..................... 3-1
Upgrade the ZyAIR Utility...................... 3-1
Содержание ZyAir G-100
Страница 1: ...ZyAIR G 100 802 11g Wireless CardBus Card User s Guide Version 1 1 April 2004...
Страница 6: ......
Страница 8: ......
Страница 16: ......
Страница 40: ......