User Guide
Page 89
... in wireless networks. Chapter 6 Wireless LAN 6.10.1 Additional Wireless Terms Table 24 Additional Wireless Terms TERM Intra-BSS Traffic RTS/CTS Threshold Preamble Fragmentation Threshold Roaming Antenna DESCRIPTION This describes direct communication (not through . If the introduction of another traffic stream creates a data transmission demand that are sometimes not aware of...
... in wireless networks. Chapter 6 Wireless LAN 6.10.1 Additional Wireless Terms Table 24 Additional Wireless Terms TERM Intra-BSS Traffic RTS/CTS Threshold Preamble Fragmentation Threshold Roaming Antenna DESCRIPTION This describes direct communication (not through . If the introduction of another traffic stream creates a data transmission demand that are sometimes not aware of...
User Guide
Page 192
... communication between wireless clients, access points and the wired network. Wireless security methods available on the NWA are : • User based identification that allows for roaming. • Support for RADIUS (Remote Authentication Dial In User Service, RFC 2138, 2139) for centralized user profile and accounting management on your network to the...
... communication between wireless clients, access points and the wired network. Wireless security methods available on the NWA are : • User based identification that allows for roaming. • Support for RADIUS (Remote Authentication Dial In User Service, RFC 2138, 2139) for centralized user profile and accounting management on your network to the...
User Guide
Page 196
... connecting to an AP) to perform IEEE 802.1x authentication with another AP before connecting to generate unique temporal encryption keys. Pre-authentication enables fast roaming by the authentication server. WPA and WPA2 regularly change and rotate the encryption keys so that uses a 256-bit mathematical algorithm called Rijndael. By generating...
... connecting to an AP) to perform IEEE 802.1x authentication with another AP before connecting to generate unique temporal encryption keys. Pre-authentication enables fast roaming by the authentication server. WPA and WPA2 regularly change and rotate the encryption keys so that uses a 256-bit mathematical algorithm called Rijndael. By generating...
User Guide
Page 209
... Rates Configuration 63, 67, 70, 73 registration product 203 related documentation 2 Remote Authentication Dial In User Service 59 remote management 17 remote management limitations 98 Roaming 89 RootAP 15 RTS (Request To Send) 190 threshold 189, 190 RTS/CTS Threshold 63, 67, 69, 73, 89 209
... Rates Configuration 63, 67, 70, 73 registration product 203 related documentation 2 Remote Authentication Dial In User Service 59 remote management 17 remote management limitations 98 Roaming 89 RootAP 15 RTS (Request To Send) 190 threshold 189, 190 RTS/CTS Threshold 63, 67, 69, 73, 89 209
User Guide
Page 211
... AP + Bridge Mode 68 Bridge Mode 65 BSS 56 Channel 57 ESS 56 Fragmentation Threshold 89 Intra-BSS Traffic 89 Operating Mode 56 Preamble 89 Roaming 89 RTS/CTS Threshold 89 SSID 56 Wireless Client Mode 68 Wireless Mode 57 WMM QoS 89 WLAN interference 189 security parameters 198 WMM 76...-MIX 58 WPA2-Pre-Shared Key 195 WPA2-PSK 195, 196 application example 197 WPA2-PSK-MIX 58 WPA-PSK 195, 196 application example 197 Z ZyXEL Device Ethernet parameters 91 good habits 17 Introduction 11 managing 16 resetting 20, 121 Security Features 17 211
... AP + Bridge Mode 68 Bridge Mode 65 BSS 56 Channel 57 ESS 56 Fragmentation Threshold 89 Intra-BSS Traffic 89 Operating Mode 56 Preamble 89 Roaming 89 RTS/CTS Threshold 89 SSID 56 Wireless Client Mode 68 Wireless Mode 57 WMM QoS 89 WLAN interference 189 security parameters 198 WMM 76...-MIX 58 WPA2-Pre-Shared Key 195 WPA2-PSK 195, 196 application example 197 WPA2-PSK-MIX 58 WPA-PSK 195, 196 application example 197 Z ZyXEL Device Ethernet parameters 91 good habits 17 Introduction 11 managing 16 resetting 20, 121 Security Features 17 211