ZyXEL Communications G-102 Betriebsanweisung Seite 63

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 65
  • Inhaltsverzeichnis
  • FEHLERBEHEBUNG
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 62
ZyXEL G-102 User’s Guide
Index v
Appendix C
Index
A
About ..............................................................4-1
About the ZyXEL Utility ................................4-1
Accessing the ZyXEL Utility..........................1-5
Add a New Profile.........................................3-14
Authentication Mode.....................................2-10
Open..........................................................2-10
Shared .......................................................2-10
Automatic WEP key generation......................2-5
B
Basic Service Set.................................... See BSS
BSS .................................................................2-2
C
CA.....................................................................iii
Certificate Authority ................................ See CA
Communication Problem
Ad-hoc(IBSS) .............................................5-3
Infrastructure...............................................5-2
Connecting to a Network ................................3-5
Copyright ...........................................................ii
Disclaimer......................................................ii
Trademarks ....................................................ii
Create WEP key with passphrase... 3-8, 3-9, 3-11
CTS (Clear to Send .........................................2-9
Customer Support ............................................. vi
D
Data encryption...............................................2-5
E
EAP Authentication
MD5 ..............................................................iii
PEAP.............................................................iii
TLS ...............................................................iii
TTLS .............................................................iii
Encryption.......................................................2-6
ESS..................................................................2-3
Extended Service Set...............................See ESS
F
Federal Communications Commission (FCC)
Interference Statement....................................v
Model Specific ...............................................v
Fragmentation Threshold ................................2-8
G
Graphics Icons Key.........................................xiv
H
Hidden node ....................................................2-9
I
IBSS ................................................................2-2
Independent Basic Service Set ..............See IBSS
Information for Canadian Users........................iv
Caution..........................................................iv
Note...............................................................iv
L
Link Info .........................................................3-1
Seitenansicht 62
1 2 ... 58 59 60 61 62 63 64 65

Kommentare zu diesen Handbüchern

Keine Kommentare