ZyXEL Communications P-660HW-D Series User Manual
Page 20

P-660HW-D Series User’s Guide
19
Table of Contents
PPPoE in Action..................................................................................................... 288
Benefits of PPPoE.................................................................................................. 288
Traditional Dial-up Scenario ................................................................................... 288
How PPPoE Works ................................................................................................ 289
ZyXEL device as a PPPoE Client .......................................................................... 289
Connecting a POTS Splitter ................................................................................... 290
Telephone Microfilters ............................................................................................ 290
ZyXEL device With ISDN ....................................................................................... 292
Log Commands...................................................................................................... 308
Log Command Example......................................................................................... 309
Wireless LAN Topologies ....................................................................................... 310
Channel.................................................................................................................. 312
RTS/CTS................................................................................................................ 312
Fragmentation Threshold ....................................................................................... 313
Preamble Type ....................................................................................................... 314
IEEE 802.11g Wireless LAN .................................................................................. 314
Wireless Security Overview ................................................................................... 315
IEEE 802.1x ........................................................................................................... 315
RADIUS.................................................................................................................. 316
Types of Authentication.......................................................................................... 317
Dynamic WEP Key Exchange................................................................................ 318
WPA and WPA2 ..................................................................................................... 319
21.4.2 WPA(2)-PSK Application Example .......................................................321
Appendix M
Pop-up Windows, JavaScripts and Java Permissions ..................................... 324
Internet Explorer Pop-up Blockers ......................................................................... 324
JavaScripts............................................................................................................. 327