
P-661H/HW Series User’s Guide
Table of Contents 21
Command Syntax................................................................................................... 327
Command Usage ................................................................................................... 327
Appendix G
Firewall Commands ............................................................................................. 329
Appendix H
NetBIOS Filter Commands .................................................................................. 335
Introduction ............................................................................................................ 335
Display NetBIOS Filter Settings ............................................................................. 335
NetBIOS Filter Configuration.................................................................................. 336
Appendix I
PPPoE ................................................................................................................... 337
PPPoE in Action..................................................................................................... 337
Benefits of PPPoE.................................................................................................. 337
Traditional Dial-up Scenario ................................................................................... 337
How PPPoE Works ................................................................................................ 338
ZyXEL Device as a PPPoE Client.......................................................................... 338
Appendix J
Log Descriptions.................................................................................................. 339
Log Commands...................................................................................................... 353
Log Command Example......................................................................................... 354
Appendix K
Wireless LANs (wireless devices only).............................................................. 355
Wireless LAN Topologies ....................................................................................... 355
Channel.................................................................................................................. 357
RTS/CTS................................................................................................................ 357
Fragmentation Threshold ....................................................................................... 358
Preamble Type ....................................................................................................... 359
IEEE 802.11g Wireless LAN .................................................................................. 359
Wireless Security Overview ................................................................................... 360
IEEE 802.1x ........................................................................................................... 360
RADIUS.................................................................................................................. 361
Types of Authentication.......................................................................................... 362
Dynamic WEP Key Exchange................................................................................ 363
WPA and WPA2 ..................................................................................................... 364
Security Parameters Summary .............................................................................. 367
Appendix L
Pop-up Windows, JavaScripts and Java Permissions ..................................... 369
Kommentare zu diesen Handbüchern