ZyXEL Communications P-660HW-D Series User Manual

Page 20

Advertising
background image

P-660HW-D Series User’s Guide

19

Table of Contents

PPPoE ................................................................................................................... 288

PPPoE in Action..................................................................................................... 288
Benefits of PPPoE.................................................................................................. 288
Traditional Dial-up Scenario ................................................................................... 288
How PPPoE Works ................................................................................................ 289
ZyXEL device as a PPPoE Client .......................................................................... 289

Appendix J
Splitters and Microfilters ..................................................................................... 290

Connecting a POTS Splitter ................................................................................... 290
Telephone Microfilters ............................................................................................ 290
ZyXEL device With ISDN ....................................................................................... 292

Appendix K
Log Descriptions.................................................................................................. 294

Log Commands...................................................................................................... 308
Log Command Example......................................................................................... 309

Appendix L
Wireless LANs ...................................................................................................... 310

Wireless LAN Topologies ....................................................................................... 310
Channel.................................................................................................................. 312
RTS/CTS................................................................................................................ 312
Fragmentation Threshold ....................................................................................... 313
Preamble Type ....................................................................................................... 314
IEEE 802.11g Wireless LAN .................................................................................. 314
Wireless Security Overview ................................................................................... 315
IEEE 802.1x ........................................................................................................... 315
RADIUS.................................................................................................................. 316
Types of Authentication.......................................................................................... 317
Dynamic WEP Key Exchange................................................................................ 318
WPA and WPA2 ..................................................................................................... 319

21.4.2 WPA(2)-PSK Application Example .......................................................321

Security Parameters Summary .............................................................................. 322

Appendix M
Pop-up Windows, JavaScripts and Java Permissions ..................................... 324

Internet Explorer Pop-up Blockers ......................................................................... 324
JavaScripts............................................................................................................. 327

Index...................................................................................................................... 332

Advertising