ZyXEL Communications P-2602HW-63C Podręcznik Użytkownika Strona 26

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 550
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów
Przeglądanie stron 25
Prestige 2602H/HW Series User’s Guide
26 Table of Contents
Macintosh OS 8/9................................................................................................... 465
Verifying Settings ............................................................................................. 466
Macintosh OS X ..................................................................................................... 466
Verifying Settings ............................................................................................. 468
Appendix C
IP Subnetting ........................................................................................................ 469
IP Addressing......................................................................................................... 469
IP Classes .............................................................................................................. 469
Subnet Masks ........................................................................................................ 470
Subnetting .............................................................................................................. 470
Example: Two Subnets .......................................................................................... 471
Example: Four Subnets.......................................................................................... 473
Example Eight Subnets.......................................................................................... 474
Subnetting With Class A and Class B Networks. ................................................... 475
Appendix D
PPPoE ................................................................................................................... 477
PPPoE in Action..................................................................................................... 477
Benefits of PPPoE.................................................................................................. 477
Traditional Dial-up Scenario ................................................................................... 477
How PPPoE Works ................................................................................................ 478
Prestige as a PPPoE Client ................................................................................... 478
Appendix E
Wireless LANs ...................................................................................................... 479
Wireless LAN Topologies ....................................................................................... 479
Ad-hoc Wireless LAN Configuration ................................................................ 479
BSS.................................................................................................................. 479
ESS.................................................................................................................. 480
Channel.................................................................................................................. 481
RTS/CTS................................................................................................................ 481
Fragmentation Threshold ....................................................................................... 482
Preamble Type ....................................................................................................... 483
IEEE 802.1x ........................................................................................................... 484
RADIUS.................................................................................................................. 484
Types of RADIUS Messages ........................................................................... 484
Types of Authentication.......................................................................................... 485
EAP-MD5 (Message-Digest Algorithm 5) ........................................................ 485
EAP-TLS (Transport Layer Security) ............................................................... 486
EAP-TTLS (Tunneled Transport Layer Service) .............................................. 486
PEAP (Protected EAP) .................................................................................... 486
Przeglądanie stron 25
1 2 ... 21 22 23 24 25 26 27 28 29 30 31 ... 549 550

Komentarze do niniejszej Instrukcji

Brak uwag