ZyXEL Communications P-660HW-T v2 User Manual

Page 20

Advertising
background image

P-660HW-T v2 User’s Guide

20

Table of Contents

NetBIOS Filter Configuration.................................................................................. 316

Appendix J
Splitters and Microfilters ..................................................................................... 317

Connecting a POTS Splitter ................................................................................... 317
Telephone Microfilters ............................................................................................ 317
ZyXEL Device With ISDN....................................................................................... 319

Appendix K
Wireless LANs ...................................................................................................... 321

Wireless LAN Topologies ....................................................................................... 321
Channel.................................................................................................................. 323
RTS/CTS................................................................................................................ 323
Fragmentation Threshold ....................................................................................... 324
Preamble Type ....................................................................................................... 325
IEEE 802.11g Wireless LAN .................................................................................. 325
Wireless Security Overview ................................................................................... 326
RADIUS.................................................................................................................. 326
Types of Authentication.......................................................................................... 327
Dynamic WEP Key Exchange................................................................................ 329
WPA and WPA2 ..................................................................................................... 329
Security Parameters Summary .............................................................................. 333

Appendix L
Pop-up Windows, JavaScripts and Java Permissions ..................................... 335

Internet Explorer Pop-up Blockers ......................................................................... 335
JavaScripts............................................................................................................. 338

Appendix M
Triangle Route ...................................................................................................... 343

The Ideal Setup...................................................................................................... 343
The “Triangle Route” Problem................................................................................ 343
The “Triangle Route” Solutions .............................................................................. 344
IP Aliasing .............................................................................................................. 344

Index...................................................................................................................... 345

Advertising