Zyxel-communications P-660HW-T v2 Instrukcja Użytkownika Strona 20

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 351
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów
Przeglądanie stron 19
P-660HW-T v2 User’s Guide
20 Table of Contents
NetBIOS Filter Configuration.................................................................................. 316
Appendix J
Splitters and Microfilters ..................................................................................... 317
Connecting a POTS Splitter ................................................................................... 317
Telephone Microfilters ............................................................................................ 317
ZyXEL Device With ISDN....................................................................................... 319
Appendix K
Wireless LANs ...................................................................................................... 321
Wireless LAN Topologies ....................................................................................... 321
Channel.................................................................................................................. 323
RTS/CTS................................................................................................................ 323
Fragmentation Threshold ....................................................................................... 324
Preamble Type ....................................................................................................... 325
IEEE 802.11g Wireless LAN .................................................................................. 325
Wireless Security Overview ................................................................................... 326
RADIUS.................................................................................................................. 326
Types of Authentication.......................................................................................... 327
Dynamic WEP Key Exchange................................................................................ 329
WPA and WPA2 ..................................................................................................... 329
Security Parameters Summary .............................................................................. 333
Appendix L
Pop-up Windows, JavaScripts and Java Permissions ..................................... 335
Internet Explorer Pop-up Blockers ......................................................................... 335
JavaScripts............................................................................................................. 338
Appendix M
Triangle Route ...................................................................................................... 343
The Ideal Setup...................................................................................................... 343
The “Triangle Route” Problem................................................................................ 343
The “Triangle Route” Solutions .............................................................................. 344
IP Aliasing .............................................................................................................. 344
Index...................................................................................................................... 345
Przeglądanie stron 19
1 2 ... 15 16 17 18 19 20 21 22 23 24 25 ... 350 351

Komentarze do niniejszej Instrukcji

Brak uwag