beautypg.com

ZyXEL Communications PRESTIGE 153 User Manual

Page 10

background image

Prestige 153/153X WAN Bridge/Routers

x

Table of Contents

Chapter 4

Remote Node Configuration

4.1 Remote Node Setup.................................................................................................. 4-1

4.2 Leased Line Support................................................................................................ 4-15

Chapter 5

Remote Node TCP/IP Configuration

5.1 LAN-to-LAN Application............................................................................................. 5-1

Chapter 6

IPX Configuration

6.1 IPX Network Environment .......................................................................................... 6-1

6.2 Prestige in an IPX Environment .................................................................................. 6-3

6.3 IPX Spoofing............................................................................................................. 6-4

6.4 IPX Ethernet Setup.................................................................................................... 6-5

6.5 LAN-to-LAN Application with Novell IPX...................................................................... 6-7

Chapter 7

Bridging Setup

7.1 Bridging in General.................................................................................................... 7-1

7.2 Bridge Ethernet Setup................................................................................................ 7-1

Chapter 8

Dial-in Server Configuration

8.1 Remote Access Server .............................................................................................. 8-2

8.2 LAN-to-LAN Application ............................................................................................. 8-3

8.3 Default Dial-In Setup.................................................................................................. 8-4

8.4 Dial-In Users Setup ................................................................................................... 8-8

8.5 CLID Authentication................................................................................................. 8-10

8.6 Callback ................................................................................................................. 8-10

Chapter 9

Filter Configuration

9.1 About Filtering........................................................................................................... 9-1

9.2 Configuring a Filter Set .............................................................................................. 9-3

9.3 Configuring a Filter Rule ............................................................................................ 9-7

Chapter 10

SNMP Configuration

10.1

About SNMP ....................................................................................................... 10-1

This manual is related to the following products: