![](/images/new-backgrounds/1107171/10717141x1.webp)
| |
RADIUS | 366 |
Types of RADIUS Messages | 366 |
Types of Authentication | 367 |
367 | |
368 | |
368 | |
PEAP (Protected EAP) | 368 |
LEAP | 368 |
Dynamic WEP Key Exchange | 368 |
WPA | 369 |
User Authentication | 369 |
Encryption | 369 |
Security Parameters Summary | 370 |
Appendix F |
|
Services | 371 |
Appendix G |
|
Firewall Commands | 375 |
Sys Firewall Commands | 375 |
Appendix H |
|
Triangle Route | 377 |
The Ideal Setup | 377 |
The “Triangle Route” Problem | 377 |
The “Triangle Route” Solutions | 378 |
IP Aliasing | 378 |
Gateways on the WAN Side | 379 |
Appendix I |
|
Log Descriptions | 381 |
Log Commands | 390 |
Configuring What You Want the ZyXEL Device to Log | 390 |
Displaying Logs | 391 |
Log Command Example | 392 |
Appendix J |
|
Command Interpreter | 393 |
Command Syntax | 393 |
Command Usage | 393 |
Appendix K |
|
Internal SPTGEN | 395 |
Table of Contents | 21 |