ZyXEL Communications ZyAIR G-220 Network Card User Manual


 
ZyAIR G-220 User’s Guide
Index Q
Appendix C
Index
A
About ..............................................................5-1
About the ZyAIR Utility......................... 5-1, 5-2
Access point mode ..........................................1-5
Access Point Mode..........................................4-1
Additional setup requirements ....................4-1
Configuration ..............................................4-4
Link Info .....................................................4-2
MAC Filter..................................................4-7
Power saving mode.....................................4-5
Security .......................................................4-6
Setup example...............................................M
Accessing the ZyAIR Utility...........................1-4
Advanced ........................................................3-8
Antenna gain...................................................4-5
Authentication Mode.......................................2-6
Auto ............................................................2-6
Open............................................................2-6
Shared .........................................................2-6
Auto authentication mode ...............................2-6
C
Communication Problem
Ad-hoc(IBSS) .............................................6-3
Infrastructure...............................................6-2
Computer’s IP Address .....................................A
Configuration.......................................... 3-3, 4-3
Connecting to a Network ................................3-3
Copyright ...........................................................ii
Disclaimer......................................................ii
Trademarks ....................................................ii
CTS (Clear to Send .........................................2-6
Customer Support ............................................vii
D
Data encryption...............................................2-4
E
ESS..................................................................2-2
Extended Service Set...............................See ESS
F
Federal Communications Commission (FCC)
Interference Statement....................................v
Model Specific ...............................................v
Filter MAC address.........................................4-7
Fragmentation Threshold ................................2-5
G
Graphics Icons Key.........................................xiv
H
Hidden node ....................................................2-5
I
IBSS ................................................................2-2
Independent Basic Service Set..............See IBSS
Information for Canadian Users........................iv
Caution..........................................................iv
Note...............................................................iv
M
MAC (Media Access Control) ........................4-6
MAC Filter......................................................4-6