Equinox Systems ZyAIR G-200 User Manual

Page 52

Advertising
background image

ZyAIR G-200 User’s Guide

J

Index

Protected EAP .............................. See PEAP

R

Related Documentation ........................... xiii
Remove the ZyAIR Utility ...................... 3-1
RF signals ...................................................A
Roaming .................................................. 2-2

Example............................................... 2-2

S

Safely disconnect the ZyAIR................... 3-1

Service Set Identity

...........................See SSID

Shared Key .............................................. 2-9
Site Survey ....................................... 2-4, 2-5
SSID ........................................................ 2-7

SSID

..........................................................

2-1

Syntax Conventions................................. xiii

T

TLS............................................................. E
Transmission rate .................................... 2-1
Transport Layer Security.................See TLS
Troubleshooting....................................... 4-1

Checking Hardware Conflict............... 4-1
Communication problems ................... 4-1
Radio interference ............................... 4-2
Starting ZyAIR Utility......................... 4-1
Using the ZyAIR ................................. 4-2

TTLS .......................................................... E
Tunneled Transport Layer Service See TTLS

U

Uninstall the ZyAIR Utility..................... 3-1
Upgrade the ZyAIR Utility...................... 3-1
User Authentication............................... 2-11
Using the ZyAIR Utility.......................... 2-1

W

Warranty .................................................... iii

Note ....................................................... iii

WEP......................................................... 2-8
WEP Data Encryption

Configuring.......................................... 2-8

WEP Data Encryption with ..2-8, 2-11, 2-13,

2-16

WEP Key ................................................. 2-8
Wired Equivalent Privacy...............See WEP
Wireless LAN

Benefits...................................................A

Wireless LAN Parameters

Channel................................................ 2-1
Configuring.......................................... 2-6
Network Type ...................................... 2-1
SSID..................................................... 2-1
Transmission Rate ............................... 2-1

Wireless LAN Security

Data Encryption with WEP ...2-8, 2-11, 2-

13, 2-16

WLAN ........................ A. See Wireless LAN
WPA ...................................................... 2-11
WPA with RADIUS Application........... 2-14
WPA-PSK Application.......................... 2-14

Z

ZyAIR Utility .......................................... 3-1

Encryption ................................2-10, 2-13
Link Info .............................................. 2-3
Remove................................................ 3-1
Site Survey........................................... 2-5
Uninstall............................................... 3-1
Upgrade ............................................... 3-1

ZyAIR Utility system tray icon ............... 1-3

Advertising