beautypg.com

ZyXEL Communications 660HW Series User Manual

Page 22

background image

Prestige 660H/HW Series User’s Guide

21

WEP Authentication Steps ..................................................................................... 400

Dynamic WEP Key Exchange ......................................................................... 401

WPA ....................................................................................................................... 402

User Authentication ........................................................................................ 402
Encryption ....................................................................................................... 402

Security Parameters Summary .............................................................................. 403
Roaming................................................................................................................. 403

Requirements for Roaming.............................................................................. 404

Appendix G
Antenna Selection and Positioning Recommendation..................................... 406

Antenna Characteristics ......................................................................................... 406

Frequency........................................................................................................ 406
Radiation Pattern ............................................................................................. 406
Antenna Gain................................................................................................... 406

Types of Antennas For WLAN................................................................................ 407

Positioning Antennas ....................................................................................... 407

Connector Type...................................................................................................... 407

Appendix H
Example Internal SPTGEN Screens.................................................................... 408

Command Examples.............................................................................................. 428

Appendix I
Command Interpreter........................................................................................... 430

Command Syntax................................................................................................... 430
Command Usage ................................................................................................... 430

Appendix J
Firewall Commands ............................................................................................. 432

Sys Firewall Commands ........................................................................................ 432

Appendix K
Brute-Force Password Guessing Protection..................................................... 434

Example ................................................................................................................. 434

Appendix L
Boot Commands .................................................................................................. 436

Appendix M
Log Descriptions.................................................................................................. 438

Log Commands...................................................................................................... 447

This manual is related to the following products: