beautypg.com

Index – Equinox Systems ZyAIR G-200 User Manual

Page 51

background image

ZyAIR G-200 User’s Guide

Index

I

Index

A

About..................................................... 2-17
Accessing the ZyAIR Utility ................... 1-3
Ad-hoc Configuration.................................A
Automatic WEP key generation .............. 2-8

B

Basic Service Set ............................. See BSS
BSS..................................................... 2-2, A

C

CA .............................................................. E
Certificate Authority..........................See CA
Communication Problem......................... 4-1

Ad-hoc(IBSS)...................................... 4-2
Infrastructure ....................................... 4-1

Configuration Utility yersion ................ 2-18
Connecting to a Wireless Network.......... 2-5
Copyright.................................................... ii

Disclaimer .............................................. ii
Trademarks............................................. ii

Customer Support..................................... vii

D

Data encryption ....................................... 2-8
Direct Sequence Spread SpectrumSee DSSS
Disable Windows XP Wireless Support.. 1-1
Disconnecting the ZyAIR from your

computer.............................................. 3-1

Distribution System........................... See DS
DS............................................................... B
DSSS ..........................................................A

E

EAP ....................................................... 2-16
EAP Authentication.................................... E

MD5........................................................ E
PEAP ...................................................... E
TLS......................................................... E
TTLS ...................................................... E

Encryption ............................................. 2-12
ESS ......................................................2-2, B
Extended Service Set....................... See ESS

Extensible Authentication Protocol

......See EAP

F

Federal Communications Commission

(FCC) Interference Statement................. v

FHSS...........................................................A
Frequency Hopping Spectrum ...... See FHSS

I

IBSS.................................................... 2-1, A
IEEE 802.11................................................A

Deployment Issues..................................C
Security Flaws ........................................C

IEEE 802.1x................................................C

Advantages .............................................C

Independent Basic Service Set...A. See IBSS
Information for Canadian Users ................ iv

Caution................................................... iv
Note ....................................................... iv

Infrastructure ........................................... 2-2
Infrastructure Configuration .......................B

L

Link Info .................................................. 2-3

M

MD5............................................................ E
Message Digest Algorithm 5 ..........See MD5

N

Network Topology With RADIUS Server

Example ..................................................C

Network Type .......................................... 2-1

Ad-Hoc(IBSS) ..................................... 2-1
Infrastructure ....................................... 2-2

O

Online Registration.................................... iii
Open System............................................ 2-9
Operating Mode...............See Network Type

P

Passphrase........... 2-8, 2-10, 2-13, 2-16, 2-17
PEAP .......................................................... E
Preface ..................................................... xiii
problem description ................................. 4-1
Product specifications.................................G