User's Manual Part 1

ZyXEL G-220F User’s Guide
Index QQ
Appendix G
Index
A
About ..............................................................5-1
About the ZyXEL Utility ................................5-1
access point mode ...........................................2-3
Access point mode ..........................................1-3
Access Point Mode..........................................4-1
Additional setup requirements ....................4-1
antenna output power..................................4-4
Configuration ..............................................4-3
Link Info .....................................................4-2
MAC Filter..................................................4-6
Setup example............................................... O
Access Points (APs)........................................2-2
Accessing the ZyXEL Utility..........................1-2
Adapter screen, the........................................3-16
ad-hoc..............................................................2-2
Antenna gain ...................................................4-4
Authentication Mode.......................................2-6
Auto ............................................................2-7
Open............................................................2-7
Shared .........................................................2-7
Auto authentication mode ...............................2-7
Automatic WEP key generation......................2-5
C
CA.................................................................. OO
Certificate Authority ................................ See CA
channel ............................................................2-1
Communication Problem
Ad-hoc(IBSS) .............................................6-2
Infrastructure...............................................6-2
Computer’s IP Address ..................................... C
Configuration ..................................................4-3
Connecting to a WLAN Network ...................3-5
Copyright ...........................................................ii
Disclaimer ......................................................ii
Trademarks.....................................................ii
CTS (Clear to Send .........................................2-6
Customer Support.............................................vii
D
Data encryption ...............................................2-5
E
EAP Authentication
MD5 ........................................................... OO
PEAP.......................................................... OO
TLS ............................................................ OO
TTLS .......................................................... OO
ESS..................................................................2-3
Extended Service Set...............................See ESS
F
Federal Communications Commission (FCC)
Interference Statement....................................v
Model Specific ...............................................v
Filter MAC address.........................................4-6
Fragmentation Threshold ................................2-5
G
Graphics Icons Key .........................................xvi
H
Hidden node ....................................................2-5