ZyXEL ZyAIR G-360 Manuel d'utilisateur Page 93

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 95
  • Table des matières
  • DEPANNAGE
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 92
ZyXEL G-360 User’s Guide
Index II
Appendix F
Index
A
About ..............................................................7-1
About the ZyXEL Utility ................................7-1
Accessing the ZyXEL Utility..........................1-4
Activating a Profile .......................................1-14
Add a New Profile...........................................5-2
Application Overview.....................................1-2
Authentication Mode.......................................4-2
Open............................................................4-2
Shared .........................................................4-2
Automatic WEP key generation......................4-2
C
CA.................................................................. GG
Certificate Authority ................................ See CA
Communication Problem
Ad-hoc(IBSS) .............................................8-3
Infrastructure...............................................8-2
Configuration Methods ...................................1-3
Configuring the Link Info screen....................2-2
Connecting to a Network ................................1-5
Copyright ...........................................................ii
Disclaimer......................................................ii
Trademarks ....................................................ii
Create WEP key with passphrase............ 4-5, 4-6
Customer Support ...........................................8-3
D
Data encryption...............................................4-1
E
EAP Authentication
MD5 ........................................................... GG
PEAP.......................................................... GG
TLS ............................................................ GG
TTLS .......................................................... GG
Encryption.......................................................CC
ESS..................................................................BB
Extended Service Set...............................See ESS
F
Federal Communications Commission (FCC)
Interference Statement...................................iv
G
G-plus..............................................................2-1
Graphics Icons Key .........................................1-2
L
LEAP.............................................................. HH
Lightweight Extensible Authentication Protocol
.................................................................... HH
M
MD5 ............................................................... GG
Message Digest Algorithm 5................. See MD5
Message Integrity Check.................................CC
MIC ........................See Message Integrity Check
N
Network Type ................................................ AA
Ad-Hoc(IBSS).....................................1-3, AA
O
One-Touch Intelligent Security Technology...6-1
Vue de la page 92
1 2 ... 88 89 90 91 92 93 94 95

Commentaires sur ces manuels

Pas de commentaire