ZyXEL Communications G-162 User Manual
Page 84

ZyXEL G-162 User’s Guide
DD
Index
Lightweight Extensible Authentication Protocol
.................................................................... BB
Link Info ......................................................... 3-1
M
MD5................................................................AA
Message Digest Algorithm 5 ................ See MD5
Message Integrity Check ................................ 2-6
MIC........................ See Message Integrity Check
N
Network Type ................................................. 2-2
Ad-Hoc(IBSS) ............................................ 2-2
O
One-Touch Intelligent Security Technology. 2-10
Online Registration........................................... iii
Open authentication mode ............................ 2-10
OTIST........................................................... 2-10
P
passphrase....................................................... 2-5
PEAP ..............................................................AA
Preface ............................................................. xv
problem description ........................................ 5-1
Profile ........................................................... 3-12
Proprietary transmission rates......................... 2-1
Protected EAP...................................... See PEAP
R
Related Documentation.................................... xv
Roaming.......................................................... 2-3
Example ...................................................... 2-4
RTS (Request To Send) .................................. 2-9
RTS/CTS handshake..................................... 2-10
RTS/CTS Threshold ....................................... 2-9
S
Security Settings
802.1x .......................................................3-10
WEP Encryption .........................................3-6
WPA ...........................................................3-9
WPA-PSK...................................................3-8
Security Settings .............................................3-6
Service Set ......................................................3-2
Service Set Identity............................... See SSID
Shared authentication mode..........................2-10
Site Survey......................................................3-3
SSID.......................................................2-1, 3-15
Syntax Conventions ......................................... xv
T
Temporal Key Integrity Protocol ....................2-6
The Adapter Screen ......................................3-21
TKIP ..........See Temporal Key Integrity Protocol
TLS ................................................................ AA
Transmission Speed ......................................3-22
Transmission Speeds.......................................2-1
Transport Layer Security ....................... See TLS
Trend Chart.....................................................3-3
Troubleshooting
Communication problem with other computers
................................................................5-2
Troubleshooting ..............................................5-1
Checking Hardware Conflict ......................5-1
Communication problems...........................5-2
Problem with link status..............................5-2
Radio interference.......................................5-2
Starting ZyXEL Utility ...............................5-1
TTLS.............................................................. AA
Tunneled Transport Layer Service....... See TTLS
U
User Authentication ........................................2-6
Using the ZyAIR Utility .................................3-1
Using the ZyXEL Utility ................................2-1