Prestige 2602H/HW Series User’s Guide
Macintosh OS 8/9...................................................................................................
465
Verifying Settings .............................................................................................
466
Macintosh OS X .....................................................................................................
468
469
IP Addressing.........................................................................................................
IP Classes ..............................................................................................................
Subnet Masks ........................................................................................................
470
Subnetting ..............................................................................................................
Example: Two Subnets ..........................................................................................
471
Example: Four Subnets..........................................................................................
473
Example Eight Subnets..........................................................................................
474
Subnetting With Class A and Class B Networks. ...................................................
475
PPPoE ...................................................................................................................
477
PPPoE in Action.....................................................................................................
Benefits of PPPoE..................................................................................................
Traditional Dial-up Scenario ...................................................................................
How PPPoE Works ................................................................................................
478
Prestige as a PPPoE Client ...................................................................................
479
Wireless LAN Topologies .......................................................................................
Ad-hoc Wireless LAN Configuration ................................................................
BSS..................................................................................................................
ESS..................................................................................................................
480
Channel..................................................................................................................
481
RTS/CTS................................................................................................................
Fragmentation Threshold .......................................................................................
482
Preamble Type .......................................................................................................
483
IEEE 802.1x ...........................................................................................................
484
RADIUS..................................................................................................................
Types of RADIUS Messages ...........................................................................
Types of Authentication..........................................................................................
485
EAP-MD5(Message-Digest Algorithm 5) ........................................................
EAP-TLS (Transport Layer Security) ...............................................................
486
EAP-TTLS (Tunneled Transport Layer Service) ..............................................
PEAP (Protected EAP) ....................................................................................
26
Table of Contents