beautypg.com

ZyXEL Communications Prestige 2602H Series User Manual

Page 26

background image

Prestige 2602H/HW Series User’s Guide

26

Table of Contents

Macintosh OS 8/9................................................................................................... 465

Verifying Settings ............................................................................................. 466

Macintosh OS X ..................................................................................................... 466

Verifying Settings ............................................................................................. 468

Appendix C
IP Subnetting ........................................................................................................ 469

IP Addressing......................................................................................................... 469
IP Classes .............................................................................................................. 469
Subnet Masks ........................................................................................................ 470
Subnetting .............................................................................................................. 470
Example: Two Subnets .......................................................................................... 471
Example: Four Subnets.......................................................................................... 473
Example Eight Subnets.......................................................................................... 474
Subnetting With Class A and Class B Networks. ................................................... 475

Appendix D
PPPoE ................................................................................................................... 477

PPPoE in Action..................................................................................................... 477
Benefits of PPPoE.................................................................................................. 477
Traditional Dial-up Scenario ................................................................................... 477
How PPPoE Works ................................................................................................ 478
Prestige as a PPPoE Client ................................................................................... 478

Appendix E
Wireless LANs ...................................................................................................... 479

Wireless LAN Topologies ....................................................................................... 479

Ad-hoc Wireless LAN Configuration ................................................................ 479
BSS.................................................................................................................. 479
ESS.................................................................................................................. 480

Channel.................................................................................................................. 481
RTS/CTS................................................................................................................ 481
Fragmentation Threshold ....................................................................................... 482
Preamble Type ....................................................................................................... 483
IEEE 802.1x ........................................................................................................... 484
RADIUS.................................................................................................................. 484

Types of RADIUS Messages ........................................................................... 484

Types of Authentication.......................................................................................... 485

EAP-MD5 (Message-Digest Algorithm 5) ........................................................ 485
EAP-TLS (Transport Layer Security) ............................................................... 486
EAP-TTLS (Tunneled Transport Layer Service) .............................................. 486
PEAP (Protected EAP) .................................................................................... 486