ZyXEL Communications 802.11g Wireless Firewall Router P-320W User Manual
Page 20

P-320W User’s Guide
20
Figure 123 Macintosh OS X: Network ................................................................................. 184
Figure 124 Red Hat 9.0: KDE: Network Configuration: Devices ........................................ 185
Figure 125 Red Hat 9.0: KDE: Ethernet Device: General ................................................. 185
Figure 126 Red Hat 9.0: KDE: Network Configuration: DNS ............................................. 186
Figure 127 Red Hat 9.0: KDE: Network Configuration: Activate ....................................... 186
Figure 128 Red Hat 9.0: Dynamic IP Address Setting in ifconfig-eth0 .............................. 187
Figure 129 Red Hat 9.0: Static IP Address Setting in ifconfig-eth0 .................................. 187
Figure 130 Red Hat 9.0: DNS Settings in resolv.conf ...................................................... 187
Figure 131 Red Hat 9.0: Restart Ethernet Card ................................................................ 188
Figure 132 Red Hat 9.0: Checking TCP/IP Properties ...................................................... 188
Figure 133 Single-Computer per Router Hardware Configuration ...................................... 190
Figure 134 ZyWALL as a PPPoE Client .............................................................................. 190
Figure 135 Transport PPP frames over Ethernet ............................................................... 191
Figure 136 PPTP Protocol Overview .................................................................................. 192
Figure 137 Example Message Exchange between Computer and an ANT ........................ 193
Figure 138 Peer-to-Peer Communication in an Ad-hoc Network ........................................ 195
Figure 139 Basic Service Set .............................................................................................. 196
Figure 140 Infrastructure WLAN ......................................................................................... 197
Figure 141 RTS/CTS ........................................................................................................... 198
Figure 142 EAP Authentication ........................................................................................... 201
Figure 143 WEP Authentication Steps ................................................................................ 204
Figure 144 Roaming Example ............................................................................................. 207