ZyXEL Communications G-162 Network Card User Manual


 
ZyXEL G-162 User’s Guide
vi Index
M
MD5.................................................................. iii
Message Digest Algorithm 5 ................ See MD5
Message Integrity Check ................................2-6
MIC........................ See Message Integrity Check
N
Network Type.................................................2-2
Ad-Hoc(IBSS) ............................................2-2
O
Online Registration...........................................iii
Open authentication mode ............................2-10
P
passphrase.......................................................2-5
PEAP ................................................................iii
Preface ............................................................xiii
problem description ........................................5-1
Profile ...........................................................3-12
Proprietary transmission rates........ 1-1, 2-2, 3-22
Protected EAP...................................... See PEAP
R
Related Documentation...................................xiii
Roaming..........................................................2-3
Example......................................................2-4
RTS (Request To Send)..................................2-9
RTS/CTS handshake..................................... 2-10
RTS/CTS Threshold .......................................2-9
S
Security Settings
802.1x .......................................................3-10
WEP Encryption.........................................3-6
WPA ...........................................................3-9
WPA-PSK...................................................3-8
Security Settings .............................................3-6
Service Set ......................................................3-2
Service Set Identity............................... See SSID
Shared authentication mode..........................2-10
Site Survey......................................................3-3
SSID.......................................................2-1, 3-15
Syntax Conventions........................................xiii
T
Temporal Key Integrity Protocol....................2-6
The Adapter Screen ......................................3-21
TKIP ..........See Temporal Key Integrity Protocol
TLS ...................................................................iii
Transmission Speed......................................3-22
Transmission Speeds.......................................2-1
Transport Layer Security ....................... See TLS
Trend Chart.....................................................3-3
Troubleshooting
Communication problem with other computers
................................................................5-2
Troubleshooting..............................................5-1
Checking Hardware Conflict ......................5-1
Communication problems...........................5-2
Problem with link status..............................5-2
Radio interference.......................................5-2
Starting ZyXEL Utility ...............................5-1
TTLS.................................................................iii
Tunneled Transport Layer Service....... See TTLS
U
User Authentication........................................2-6
Using the ZyAIR Utility .................................3-1
Using the ZyXEL Utility ................................2-1
W
Warranty ...........................................................iii
Note...............................................................iii
WEP................................................................2-5
WEP Data Encryption with.............................2-5