ZyXEL Communications A-6000 manual Pns, Pop, Pots, Ppp, Pptp, Pvc

Models: A-6000

1 46
Download 46 pages 49.39 Kb
Page 43
Image 43

 

 

 

 

A-6000 High Speed, Long Range Ethernet Wireless Bridge

 

 

 

 

 

 

Ping Attack

An attack that slows down the network until it is unusable. The attacker sends a

 

 

 

"ping" command to the network repeatedly to slow it down. See also Denial of

 

 

 

 

Service.

 

 

 

 

 

 

 

 

Pirate

 

Someone who steals or distributes software without paying the legitimate owner

 

 

 

for it. This category of computer criminal includes several different types of

 

 

 

 

illegal activities Making copies of software for others to use. Distributing pirated

 

 

 

 

software over the Internet or a Bulletin Board System. Receiving or

 

 

 

 

downloading illegal copies of software in any form.

 

 

 

 

 

 

 

Pirated Software

 

Software that has been illegally copied, or that is being used in violation of the

 

 

 

software's licensing agreement. Pirated software is often distributed through

 

 

 

 

pirate bulletin boards or on the Internet. In the internet underground it is known

 

 

 

 

as Warez.

 

 

 

 

 

 

 

 

Plain Text

 

The opposite of Cipher Text, Plain Text is readable by anyone.

 

 

 

 

 

 

 

PNS

 

PPTP Network Server.

A PNS must have IP connectivity.

 

 

 

 

 

 

POP

 

Post Office Protocol. This is a common protocol used for sending, receiving,

 

 

 

and delivering mail messages.

 

 

 

 

 

 

 

Port

 

An Internet port refers to a number that is part of a URL, appearing after a colon

 

 

 

(:) right after the domain name. Every service on an Internet server listens on a

 

 

 

 

particular port number on that server. Most services have standard port

 

 

 

 

numbers, e.g. Web servers normally listen on port 80.

 

 

 

 

 

 

 

Port (H/W)

 

An interface on a computer for connecting peripherals or devices to the

 

 

 

computer. A printer port, for example, is an interface that is designed to have a

 

 

 

 

printer connected to it. Ports can be defined by specific hardware (such as a

 

 

 

 

keyboard port) or through software.

 

 

 

 

 

 

 

POTS

 

Plain Old Telephone Service is the analog telephone service that runs over

 

 

 

copper twisted-pair wires and is based on the original Bell telephone system.

 

 

 

 

Twisted-pair wires connect homes and businesses to a neighborhood central

 

 

 

 

office. This is called the local loop. The central office is connected to other

 

 

 

 

central offices and long-distance facilities.

 

 

 

 

 

 

 

 

PPP

 

Point to Point Protocol.

PPP encapsulates and transmits IP (Internet Protocol)

 

 

 

datagrams over serial point-to-point links. PPP works with other protocols such

 

 

 

 

as IPX (Internetwork Packet Exchange). The protocol is defined in IETF

 

 

 

 

(Internet Engineering Task Force) RFC 1661 through 1663. PPP provides

 

 

 

 

router-to-router, host-to-router, and host-to-host connections.

 

 

 

 

 

 

 

PPTP

 

Point-to-Point Tunneling Protocol.

 

 

 

 

 

 

Promiscuous

 

Actively capturing packet information from a network. Most computers only

 

Packet Capture

 

collect packets specifically addressed to them. Promiscuous packet capture

 

 

 

 

acquires all network traffic it can regardless of where the packets are

 

 

 

 

addressed.

 

 

 

 

 

 

 

 

Protocol

 

A “language” for communicating on a network. Protocols are sets of standards

 

 

 

or rules used to define, format, and transmit data across a network. There are

 

 

 

 

many different protocols used on networks. For example, most web pages are

 

 

 

 

transmitted using the HTTP protocol.

 

 

 

 

 

 

 

Proxy Server

 

A server that performs network operations in lieu of other systems on the

 

 

 

network. Proxy Servers are most often used as part of a firewall to mask the

 

 

 

 

identity of users inside a corporate network yet still provide access to the

 

 

 

 

Internet. When a user connects to a proxy server, via a web browser or other

 

 

 

 

networked application, he submits commands to the proxy server. The server

 

 

 

 

then submits those same commands to the Internet, yet without revealing any

 

 

 

 

information about the system that originally requested the information. Proxy

 

 

 

 

servers are an ideal way to also have all users on a corporate network channel

 

 

 

 

through one point for all external communications. Proxy servers can be

 

 

 

 

configured to block certain kinds of connections and stop some hacks.

 

 

 

 

 

 

 

Public Key

 

System of encrypting electronic files using a key pair. The key pair contains a

 

Encryption

 

public key used during encryption, and a corresponding private key used during

 

 

 

 

decryption.

 

 

 

 

 

 

 

 

PVC

 

Permanent Virtual Circuit. A PVC is a logical point-to-point circuit between

 

 

 

customer sites. PVCs are low-delay circuits because routing decisions do not

 

CLI commands

5-5

Page 43
Image 43
ZyXEL Communications A-6000 manual Pns, Pop, Pots, Ppp, Pptp, Pvc

A-6000 specifications

ZyXEL Communications A-6000 is a cutting-edge networking device that has been designed to meet the demanding needs of today's digital lifestyle. This versatile and powerful device serves as a gateway for seamless connectivity, providing an efficient solution for both home and small office environments.

One of the standout features of the A-6000 is its dual-band Wi-Fi technology. Supporting both 2.4 GHz and 5 GHz bands, the device ensures optimal performance and flexibility for various applications. While the 2.4 GHz band offers extended range, the 5 GHz band provides faster speeds, which is particularly beneficial for high-bandwidth activities such as online gaming, video streaming, and large file downloads. This dual-band capability allows users to easily manage multiple devices without compromising overall network performance.

The A-6000 is equipped with advanced security protocols to safeguard user data. With built-in WPA3 encryption, the device enhances protection against unauthorized access while ensuring that sensitive information remains secure. Additionally, the A-6000 features customizable firewall settings, intrusion detection, and more, enabling businesses and individuals to maintain secure networks tailored to their unique requirements.

Another remarkable technology integrated into the A-6000 is MU-MIMO (Multi-User, Multiple Input, Multiple Output). This allows the device to communicate with multiple devices simultaneously, significantly improving network efficiency and reducing latency. As more devices connect to the network, MU-MIMO ensures that data is transmitted smoothly, providing a seamless experience for all users.

The A-6000 is designed with user-friendly management in mind. Its intuitive web interface simplifies network configuration, enabling users to set up and manage their networks effortlessly. Furthermore, the device supports mobile app management, allowing for remote monitoring and control of the network from anywhere at any time.

Another key characteristic of the ZyXEL A-6000 is its robust build quality and compact design. It not only maximizes performance but also minimizes interference, making it an ideal choice for various environments. With support for advanced technologies such as beamforming, the A-6000 enhances signal strength, providing better coverage to hard-to-reach areas.

Overall, ZyXEL Communications A-6000 stands out as a reliable and high-performance networking solution. With its combination of dual-band technology, enhanced security features, MU-MIMO support, and user-friendly management options, it is well-suited for those seeking robust connectivity in a continuously evolving digital landscape. Whether for personal use or small business applications, the A-6000 is a comprehensive device that meets modern connectivity demands with ease.