
ZyAIR G-100 User’s Guide
Index G
Index
About..................................................... 2-19
Accessing the ZyAIR Utility ................... 1-3
Ad-hoc Configuration.................................A
Automatic WEP key generation .............. 2-9
Basic Service Set ............................. See BSS
Benefits of a Wireless LAN .................... 2-1
BSS..................................................... 2-3, A
CA .............................................................. E
Certificate Authority..........................See CA
Communication Problem......................... 4-1
Ad-hoc(IBSS)...................................... 4-2
Infrastructure ....................................... 4-1
Configuration Utility yersion ................ 2-20
Connecting to a Wireless Network.......... 2-6
Copyright.................................................... ii
Disclaimer .............................................. ii
Trademarks............................................. ii
Customer Support..................................... vii
Data encryption ....................................... 2-9
Direct Sequence Spread SpectrumSee DSSS
Disable Windows XP Wireless Support.. 1-1
Disconnecting the ZyAIR from your
computer.............................................. 3-1
Distribution System........................... See DS
DS............................................................... B
DSSS ..........................................................A
EAP ....................................................... 2-17
EAP Authentication.................................... E
MD5........................................................ E
PEAP ...................................................... E
TLS......................................................... E
TTLS ...................................................... E
Encryption ............................................. 2-13
ESS ......................................................2-3, B
Extended Service Set....................... See ESS
Extensible Authentication Protocol.See EAP
Federal Communications Commission
(FCC) Interference Statement..................v
FHSS ..........................................................A
Frequency Hopping Spectrum.......See FHSS
IBSS ................................................... 2-2, A
IEEE 802.11 ...............................................A
Deployment Issues ................................. C
Security Flaws ........................................ C
IEEE 802.11g .......................................... 2-1
IEEE 802.1x ............................................... C
Advantages ............................................. C
Independent Basic Service Set ..A. See IBSS
Information for Canadian Users ................ iv
Caution................................................... iv
Note ....................................................... iv
Infrastructure ........................................... 2-3
Infrastructure Configuration .......................B
Link Info.................................................. 2-4
MD5............................................................ E
Message Digest Algorithm 5 ..........See MD5
Network Topology With RADIUS Server
Example..................................................C
Network Type .......................................... 2-2
Ad-Hoc(IBSS) ..................................... 2-2
Infrastructure ....................................... 2-3
Notes on WLAN Configuration............... 2-1
Online Registration.................................... iii
Open System.......................................... 2-10
Operating Mode...............See Network Type
Passphrase.................... 2-9, 2-11, 2-14, 2-17
PEAP .......................................................... E
Preface ..................................................... xiii
problem description ................................. 4-1
Product specifications................................. 7
Protected EAP............................... See PEAP
Related Documentation ........................... xiii
Remove the ZyAIR Utility ...................... 3-1
RF signals ...................................................A
Roaming................................................... 2-3
Example............................................... 2-3
Safely disconnect the ZyAIR................... 3-1
Service Set Identity........................ See SSID
Shared Key ............................................ 2-10
Site Survey........................................2-5, 2-6
SSID ........................................................ 2-8
SSID ........................................................ 2-2
Syntax Conventions................................. xiii
TLS ............................................................. E
Transmission rate..................................... 2-2
Transport Layer Security .................See TLS
Troubleshooting....................................... 4-1
Checking Hardware Conflict ............... 4-1
Communication problems.................... 4-1
Radio interference................................ 4-2
Starting ZyAIR Utility......................... 4-1
Using the ZyAIR ................................. 4-2
TTLS........................................................... E
Tunneled Transport Layer Service See TTLS
Uninstall the ZyAIR Utility..................... 3-1
Upgrade the ZyAIR Utility...................... 3-1
Comentários a estes Manuais