Zyxel-communications P-661H Series Instrukcja Użytkownika Strona 21

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 383
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów
Przeglądanie stron 20
P-661H/HW Series User’s Guide
Table of Contents 21
Command Syntax................................................................................................... 327
Command Usage ................................................................................................... 327
Appendix G
Firewall Commands ............................................................................................. 329
Appendix H
NetBIOS Filter Commands .................................................................................. 335
Introduction ............................................................................................................ 335
Display NetBIOS Filter Settings ............................................................................. 335
NetBIOS Filter Configuration.................................................................................. 336
Appendix I
PPPoE ................................................................................................................... 337
PPPoE in Action..................................................................................................... 337
Benefits of PPPoE.................................................................................................. 337
Traditional Dial-up Scenario ................................................................................... 337
How PPPoE Works ................................................................................................ 338
ZyXEL Device as a PPPoE Client.......................................................................... 338
Appendix J
Log Descriptions.................................................................................................. 339
Log Commands...................................................................................................... 353
Log Command Example......................................................................................... 354
Appendix K
Wireless LANs (wireless devices only).............................................................. 355
Wireless LAN Topologies ....................................................................................... 355
Channel.................................................................................................................. 357
RTS/CTS................................................................................................................ 357
Fragmentation Threshold ....................................................................................... 358
Preamble Type ....................................................................................................... 359
IEEE 802.11g Wireless LAN .................................................................................. 359
Wireless Security Overview ................................................................................... 360
IEEE 802.1x ........................................................................................................... 360
RADIUS.................................................................................................................. 361
Types of Authentication.......................................................................................... 362
Dynamic WEP Key Exchange................................................................................ 363
WPA and WPA2 ..................................................................................................... 364
Security Parameters Summary .............................................................................. 367
Appendix L
Pop-up Windows, JavaScripts and Java Permissions ..................................... 369
Przeglądanie stron 20
1 2 ... 16 17 18 19 20 21 22 23 24 25 26 ... 382 383

Komentarze do niniejszej Instrukcji

Brak uwag