Appendix c index – ZyXEL Communications ZyAIR G-220 User Manual

Page 65

Advertising
background image

ZyAIR G-220 User’s Guide

Index

Q

Appendix C

Index

A

About ..............................................................5-1
About the ZyAIR Utility ......................... 5-1, 5-2
Access point mode ..........................................1-5
Access Point Mode..........................................4-1

Additional setup requirements ....................4-1
Configuration ..............................................4-4
Link Info .....................................................4-2
MAC Filter..................................................4-7
Power saving mode .....................................4-5
Security .......................................................4-6
Setup example...............................................M

Accessing the ZyAIR Utility...........................1-4
Advanced ........................................................3-8
Antenna gain ...................................................4-5
Authentication Mode.......................................2-6

Auto ............................................................2-6
Open............................................................2-6
Shared .........................................................2-6

Auto authentication mode ...............................2-6

C

Communication Problem

Ad-hoc(IBSS) .............................................6-3
Infrastructure...............................................6-2

Computer’s IP Address ..................................... A
Configuration .......................................... 3-3, 4-3
Connecting to a Network ................................3-3
Copyright ...........................................................ii

Disclaimer ......................................................ii
Trademarks ....................................................ii

CTS (Clear to Send .........................................2-6
Customer Support ............................................vii

D

Data encryption ...............................................2-4

E

ESS..................................................................2-2
Extended Service Set...............................See ESS

F

Federal Communications Commission (FCC)

Interference Statement....................................v
Model Specific ...............................................v

Filter MAC address .........................................4-7
Fragmentation Threshold ................................2-5

G

Graphics Icons Key .........................................xiv

H

Hidden node ....................................................2-5

I

IBSS ................................................................2-2
Independent Basic Service Set .............. See IBSS
Information for Canadian Users........................iv

Caution..........................................................iv
Note...............................................................iv

M

MAC (Media Access Control) ........................4-6
MAC Filter......................................................4-6

Advertising