ZyXEL Communications P-661H Series User Manual
Page 21

P-661H/HW Series User’s Guide
Table of Contents
21
Introduction ............................................................................................................ 335
Display NetBIOS Filter Settings ............................................................................. 335
NetBIOS Filter Configuration.................................................................................. 336
PPPoE in Action..................................................................................................... 337
Benefits of PPPoE.................................................................................................. 337
Traditional Dial-up Scenario ................................................................................... 337
How PPPoE Works ................................................................................................ 338
ZyXEL Device as a PPPoE Client.......................................................................... 338
Log Commands...................................................................................................... 353
Log Command Example......................................................................................... 354
Wireless LAN Topologies ....................................................................................... 355
Channel.................................................................................................................. 357
RTS/CTS................................................................................................................ 357
Fragmentation Threshold ....................................................................................... 358
Preamble Type ....................................................................................................... 359
IEEE 802.11g Wireless LAN .................................................................................. 359
Wireless Security Overview ................................................................................... 360
IEEE 802.1x ........................................................................................................... 360
RADIUS.................................................................................................................. 361
Types of Authentication.......................................................................................... 362
Dynamic WEP Key Exchange................................................................................ 363
WPA and WPA2 ..................................................................................................... 364
Security Parameters Summary .............................................................................. 367
Appendix L
Pop-up Windows, JavaScripts and Java Permissions ..................................... 369