Prestige 2602H/HW Series User’s Guide
LEAP................................................................................................................
486
Dynamic WEP Key Exchange .........................................................................
WPA .......................................................................................................................
487
User Authentication ........................................................................................
Encryption .......................................................................................................
Security Parameters Summary ..............................................................................
488
489
The Ideal Setup......................................................................................................
The “Triangle Route” Problem................................................................................
The “Triangle Route” Solutions ..............................................................................
490
IP Aliasing ..............................................................................................................
Gateways on the WAN Side...................................................................................
491
493
Internal SPTGEN Overview ...................................................................................
The Configuration Text File Format........................................................................
Internal SPTGEN File Modification - Important Points to Remember ..............
Internal SPTGEN FTP Download Example............................................................
494
Internal SPTGEN FTP Upload Example ................................................................
495
Command Examples..............................................................................................
516
Command Interpreter...........................................................................................
519
Command Syntax...................................................................................................
Command Usage ...................................................................................................
521
Sys Firewall Commands ........................................................................................
523
Log Descriptions..................................................................................................
525
Log Commands......................................................................................................
534
Configuring What You Want the Prestige to Log .............................................
Displaying Logs ...............................................................................................
535
Log Command Example.........................................................................................
536
Table of Contents
27