
P-2602H(W)(L)-DxA Series User’s Guide
Table of Contents 21
RADIUS.................................................................................................................. 366
Types of RADIUS Messages ........................................................................... 366
Types of Authentication.......................................................................................... 367
EAP-MD5 (Message-Digest Algorithm 5) ........................................................ 367
EAP-TLS (Transport Layer Security) ............................................................... 368
EAP-TTLS (Tunneled Transport Layer Service) .............................................. 368
PEAP (Protected EAP) .................................................................................... 368
LEAP................................................................................................................ 368
Dynamic WEP Key Exchange ......................................................................... 368
WPA ....................................................................................................................... 369
User Authentication ........................................................................................ 369
Encryption ....................................................................................................... 369
Security Parameters Summary .............................................................................. 370
Appendix F
Services ................................................................................................................ 371
Appendix G
Firewall Commands ............................................................................................. 375
Sys Firewall Commands ........................................................................................ 375
Appendix H
Triangle Route ...................................................................................................... 377
The Ideal Setup...................................................................................................... 377
The “Triangle Route” Problem................................................................................ 377
The “Triangle Route” Solutions .............................................................................. 378
IP Aliasing .............................................................................................................. 378
Gateways on the WAN Side................................................................................... 379
Appendix I
Log Descriptions.................................................................................................. 381
Log Commands...................................................................................................... 390
Configuring What You Want the ZyXEL Device to Log.................................... 390
Displaying Logs ............................................................................................... 391
Log Command Example......................................................................................... 392
Appendix J
Command Interpreter........................................................................................... 393
Command Syntax................................................................................................... 393
Command Usage ................................................................................................... 393
Appendix K
Internal SPTGEN .................................................................................................. 395
Kommentare zu diesen Handbüchern