
P-661H/HW Series User’s Guide
Table of Contents 13
4.3 Traffic Shaping ...................................................................................................80
4.3.1 ATM Traffic Classes ..................................................................................81
4.3.1.1 Constant Bit Rate (CBR) .................................................................81
4.3.1.2 Variable Bit Rate (VBR) ...................................................................81
4.3.1.3 Unspecified Bit Rate (UBR) .............................................................82
4.4 Zero Configuration Internet Access ....................................................................82
4.5 Internet Connection ...........................................................................................82
4.5.1 Configuring Advanced Internet Connection ..............................................84
4.6 Configuring More Connections ...........................................................................86
4.6.1 More Connections Edit ............................................................................87
4.6.2 Configuring More Connections Advanced Setup ......................................90
4.7 Traffic Redirect ...................................................................................................91
4.8 Configuring WAN Backup Setup .......................................................................92
Chapter 5
LAN Setup............................................................................................................... 95
5.1 LAN Overview ...................................................................................................95
5.1.1 LANs, WANs and the ZyXEL Device ........................................................95
5.1.2 DHCP Setup .............................................................................................96
5.1.2.1 IP Pool Setup ..................................................................................96
5.1.3 DNS Server Address ................................................................................96
5.1.4 DNS Server Address Assignment .............................................................97
5.2 LAN TCP/IP ........................................................................................................97
5.2.1 IP Address and Subnet Mask ...................................................................97
5.2.1.1 Private IP Addresses .......................................................................98
5.2.2 RIP Setup .................................................................................................98
5.2.3 Multicast ....................................................................................................99
5.2.4 Any IP .......................................................................................................99
5.2.4.1 How Any IP Works ........................................................................100
5.3 Configuring LAN IP ..........................................................................................101
5.3.1 Configuring Advanced LAN Setup ..........................................................101
5.4 DHCP Setup .....................................................................................................103
5.5 LAN Client List .................................................................................................104
5.6 LAN IP Alias .....................................................................................................106
Chapter 6
Wireless LAN ........................................................................................................ 109
6.1 Wireless Network Overview .............................................................................109
6.2 Wireless Security Overview .............................................................................110
6.2.1 SSID .......................................................................................................110
6.2.2 MAC Address Filter .................................................................................110
6.2.3 User Authentication ................................................................................110
6.2.4 Encryption ............................................................................................... 111
Kommentare zu diesen Handbüchern