beautypg.com

ZyXEL Communications G-360 User Manual

Page 64

background image

ZyXEL G-360 User’s Guide

vi

Index

M

MD5.................................................................. iii
Message Digest Algorithm 5 ................ See MD5
Message Integrity Check ................................ 2-6
MIC........................ See Message Integrity Check

N

Network Type ................................................. 2-2

Ad-Hoc(IBSS) ............................................ 2-2

O

Online Registration........................................... iii
Open authentication mode ............................ 2-10

P

passphrase....................................................... 2-5
PEAP ................................................................ iii
Preface ............................................................ xiii
problem description ........................................ 5-1
Profile ........................................................... 3-12
Proprietary transmission rates........ 1-1, 2-2, 3-22
Protected EAP...................................... See PEAP

R

Related Documentation................................... xiii
Roaming.......................................................... 2-3

Example ...................................................... 2-4

RTS (Request To Send) .................................. 2-9
RTS/CTS handshake....................................... 2-9
RTS/CTS Threshold ....................................... 2-8

S

Security Settings

802.1x ....................................................... 3-10
WEP Encryption ......................................... 3-6
WPA ........................................................... 3-9
WPA-PSK................................................... 3-8

Security Settings .............................................3-6
Service Set ......................................................3-2
Service Set Identity............................... See SSID
Shared authentication mode..........................2-10
Site Survey......................................................3-3
SSID.......................................................2-1, 3-15
Syntax Conventions ........................................xiii

T

Temporal Key Integrity Protocol ....................2-6
The Adapter Screen ......................................3-21
TKIP ..........See Temporal Key Integrity Protocol
TLS ...................................................................iii
Transmission Speed ......................................3-22
Transmission Speeds.......................................2-1
Transport Layer Security ....................... See TLS
Trend Chart.....................................................3-3
Troubleshooting

Communication problem with other computers

................................................................5-2

Troubleshooting ..............................................5-1

Checking Hardware Conflict ......................5-1
Communication problems...........................5-2
Problem with link status..............................5-2
Radio interference.......................................5-2
Starting ZyXEL Utility ...............................5-1

TTLS.................................................................iii
Tunneled Transport Layer Service....... See TTLS

U

User Authentication ........................................2-6
Using the ZyAIR Utility .................................3-1
Using the ZyXEL Utility ................................2-1

W

Warranty ...........................................................iii

Note...............................................................iii

WEP................................................................2-5
WEP Data Encryption with.............................2-5