Index – Equinox Systems ZyAIR G-200 User Manual
Page 51
ZyAIR G-200 User’s Guide
Index
I
Index
A
About..................................................... 2-17
Accessing the ZyAIR Utility ................... 1-3
Ad-hoc Configuration.................................A
Automatic WEP key generation .............. 2-8
B
Basic Service Set ............................. See BSS
BSS..................................................... 2-2, A
C
CA .............................................................. E
Certificate Authority..........................See CA
Communication Problem......................... 4-1
Ad-hoc(IBSS)...................................... 4-2
Infrastructure ....................................... 4-1
Configuration Utility yersion ................ 2-18
Connecting to a Wireless Network.......... 2-5
Copyright.................................................... ii
Disclaimer .............................................. ii
Trademarks............................................. ii
Customer Support..................................... vii
D
Data encryption ....................................... 2-8
Direct Sequence Spread SpectrumSee DSSS
Disable Windows XP Wireless Support.. 1-1
Disconnecting the ZyAIR from your
computer.............................................. 3-1
Distribution System........................... See DS
DS............................................................... B
DSSS ..........................................................A
E
EAP ....................................................... 2-16
EAP Authentication.................................... E
MD5........................................................ E
PEAP ...................................................... E
TLS......................................................... E
TTLS ...................................................... E
Encryption ............................................. 2-12
ESS ......................................................2-2, B
Extended Service Set....................... See ESS
Extensible Authentication Protocol
......See EAP
F
Federal Communications Commission
(FCC) Interference Statement................. v
FHSS...........................................................A
Frequency Hopping Spectrum ...... See FHSS
I
IBSS.................................................... 2-1, A
IEEE 802.11................................................A
Deployment Issues..................................C
Security Flaws ........................................C
IEEE 802.1x................................................C
Advantages .............................................C
Independent Basic Service Set...A. See IBSS
Information for Canadian Users ................ iv
Caution................................................... iv
Note ....................................................... iv
Infrastructure ........................................... 2-2
Infrastructure Configuration .......................B
L
Link Info .................................................. 2-3
M
MD5............................................................ E
Message Digest Algorithm 5 ..........See MD5
N
Network Topology With RADIUS Server
Example ..................................................C
Network Type .......................................... 2-1
Ad-Hoc(IBSS) ..................................... 2-1
Infrastructure ....................................... 2-2
O
Online Registration.................................... iii
Open System............................................ 2-9
Operating Mode...............See Network Type
P
Passphrase........... 2-8, 2-10, 2-13, 2-16, 2-17
PEAP .......................................................... E
Preface ..................................................... xiii
problem description ................................. 4-1
Product specifications.................................G