ZyXEL Communications G-360 User Manual
Page 64
![background image](/manuals/231152/64/background.png)
ZyXEL G-360 User’s Guide
vi
Index
M
MD5.................................................................. iii
Message Digest Algorithm 5 ................ See MD5
Message Integrity Check ................................ 2-6
MIC........................ See Message Integrity Check
N
Network Type ................................................. 2-2
Ad-Hoc(IBSS) ............................................ 2-2
O
Online Registration........................................... iii
Open authentication mode ............................ 2-10
P
passphrase....................................................... 2-5
PEAP ................................................................ iii
Preface ............................................................ xiii
problem description ........................................ 5-1
Profile ........................................................... 3-12
Proprietary transmission rates........ 1-1, 2-2, 3-22
Protected EAP...................................... See PEAP
R
Related Documentation................................... xiii
Roaming.......................................................... 2-3
Example ...................................................... 2-4
RTS (Request To Send) .................................. 2-9
RTS/CTS handshake....................................... 2-9
RTS/CTS Threshold ....................................... 2-8
S
Security Settings
802.1x ....................................................... 3-10
WEP Encryption ......................................... 3-6
WPA ........................................................... 3-9
WPA-PSK................................................... 3-8
Security Settings .............................................3-6
Service Set ......................................................3-2
Service Set Identity............................... See SSID
Shared authentication mode..........................2-10
Site Survey......................................................3-3
SSID.......................................................2-1, 3-15
Syntax Conventions ........................................xiii
T
Temporal Key Integrity Protocol ....................2-6
The Adapter Screen ......................................3-21
TKIP ..........See Temporal Key Integrity Protocol
TLS ...................................................................iii
Transmission Speed ......................................3-22
Transmission Speeds.......................................2-1
Transport Layer Security ....................... See TLS
Trend Chart.....................................................3-3
Troubleshooting
Communication problem with other computers
................................................................5-2
Troubleshooting ..............................................5-1
Checking Hardware Conflict ......................5-1
Communication problems...........................5-2
Problem with link status..............................5-2
Radio interference.......................................5-2
Starting ZyXEL Utility ...............................5-1
TTLS.................................................................iii
Tunneled Transport Layer Service....... See TTLS
U
User Authentication ........................................2-6
Using the ZyAIR Utility .................................3-1
Using the ZyXEL Utility ................................2-1
W
Warranty ...........................................................iii
Note...............................................................iii
WEP................................................................2-5
WEP Data Encryption with.............................2-5