beautypg.com

ZyXEL Communications G-162 User Manual

Page 84

background image

ZyXEL G-162 User’s Guide

DD

Index

Lightweight Extensible Authentication Protocol

.................................................................... BB

Link Info ......................................................... 3-1

M

MD5................................................................AA
Message Digest Algorithm 5 ................ See MD5
Message Integrity Check ................................ 2-6
MIC........................ See Message Integrity Check

N

Network Type ................................................. 2-2

Ad-Hoc(IBSS) ............................................ 2-2

O

One-Touch Intelligent Security Technology. 2-10
Online Registration........................................... iii
Open authentication mode ............................ 2-10
OTIST........................................................... 2-10

P

passphrase....................................................... 2-5
PEAP ..............................................................AA
Preface ............................................................. xv
problem description ........................................ 5-1
Profile ........................................................... 3-12
Proprietary transmission rates......................... 2-1
Protected EAP...................................... See PEAP

R

Related Documentation.................................... xv
Roaming.......................................................... 2-3

Example ...................................................... 2-4

RTS (Request To Send) .................................. 2-9
RTS/CTS handshake..................................... 2-10
RTS/CTS Threshold ....................................... 2-9

S

Security Settings

802.1x .......................................................3-10
WEP Encryption .........................................3-6
WPA ...........................................................3-9
WPA-PSK...................................................3-8

Security Settings .............................................3-6
Service Set ......................................................3-2
Service Set Identity............................... See SSID
Shared authentication mode..........................2-10
Site Survey......................................................3-3
SSID.......................................................2-1, 3-15
Syntax Conventions ......................................... xv

T

Temporal Key Integrity Protocol ....................2-6
The Adapter Screen ......................................3-21
TKIP ..........See Temporal Key Integrity Protocol
TLS ................................................................ AA
Transmission Speed ......................................3-22
Transmission Speeds.......................................2-1
Transport Layer Security ....................... See TLS
Trend Chart.....................................................3-3
Troubleshooting

Communication problem with other computers

................................................................5-2

Troubleshooting ..............................................5-1

Checking Hardware Conflict ......................5-1
Communication problems...........................5-2
Problem with link status..............................5-2
Radio interference.......................................5-2
Starting ZyXEL Utility ...............................5-1

TTLS.............................................................. AA
Tunneled Transport Layer Service....... See TTLS

U

User Authentication ........................................2-6
Using the ZyAIR Utility .................................3-1
Using the ZyXEL Utility ................................2-1