ZyXEL Communications G-220 Network Card User Manual


 
ZyAIR G-220 User’s Guide
Index xix
Appendix D
Index
A
About ..............................................................5-1
About the ZyXEL Utility ................................5-1
Access point mode ..........................................1-6
Access Point Mode..........................................4-1
Additional setup requirements ....................4-1
Configuration ..............................................4-4
Link Info .....................................................4-2
MAC Filter..................................................4-7
Power saving mode.....................................4-5
Setup example..............................................xv
Accessing the ZyXEL Utility..........................1-5
Adapter..........................................................3-17
Antenna gain...................................................4-5
Authentication Mode.......................................2-6
Auto ............................................................2-6
Open............................................................2-6
Shared .........................................................2-6
Auto authentication mode...............................2-6
Automatic WEP key generation......................2-5
C
Communication Problem
Ad-hoc(IBSS) .............................................6-3
Infrastructure...............................................6-3
Computer’s IP Address.....................................iii
Configuration..................................................4-3
Connecting to a Network ................................3-6
Copyright ...........................................................ii
Disclaimer......................................................ii
Trademarks ....................................................ii
CTS (Clear to Send .........................................2-6
Customer Support ............................................vii
D
Data encryption...............................................2-4
E
ESS..................................................................2-3
Extended Service Set...............................See ESS
F
Federal Communications Commission (FCC)
Interference Statement....................................v
Model Specific ...............................................v
Filter MAC address.........................................4-7
Fragmentation Threshold ................................2-5
G
Graphics Icons Key.........................................xiv
H
Hidden node....................................................2-5
I
IBSS ................................................................2-2
Independent Basic Service Set..............See IBSS
Information for Canadian Users........................iv
Caution..........................................................iv
Note...............................................................iv
L
Link Info .........................................................3-1