P-335 Series User’s Guide

41.3 Problems with the WAN .................................................................................

391

41.4 Problems Accessing the Prestige ..................................................................

392

41.5 Problems with Restricted Web Pages and Keyword Blocking .......................

392

41.5.1 Pop-up Windows, JavaScripts and Java Permissions ..........................

393

41.5.1.1 Internet Explorer Pop-up Blockers ..............................................

394

41.5.1.2 JavaScripts ..................................................................................

397

41.5.1.3 Java Permissions ........................................................................

399

41.5.2 ActiveX Controls in Internet Explorer ....................................................

401

Appendix A

 

Product Specifications ........................................................................................

404

Appendix B

 

PPPoE ...................................................................................................................

406

Appendix C

 

PPTP......................................................................................................................

408

Appendix D

 

Print Server...........................................................................................................

412

Appendix E

 

Print Server Specifications .................................................................................

434

Appendix F

 

Appendix G

 

Log Descriptions..................................................................................................

442

Appendix H

 

Setting up Your Computer’s IP Address............................................................

444

Appendix I

 

Wireless LANs ......................................................................................................

456

Appendix J

 

Antenna Selection and Positioning Recommendation.....................................

470

Appendix K

 

Brute-Force Password Guessing Protection.....................................................

472

Appendix L

 

Triangle Route ......................................................................................................

474

Table of Contents

20