P-660H/HW/W-T Series User’ Guide
Command Usage ...................................................................................................
386
Firewall Commands .............................................................................................
388
NetBIOS Filter Commands ..................................................................................
394
Introduction ............................................................................................................
Display NetBIOS Filter Settings .............................................................................
NetBIOS Filter Configuration..................................................................................
395
Splitters and Microfilters .....................................................................................
398
Connecting a POTS Splitter ...................................................................................
Telephone Microfilters ............................................................................................
Prestige With ISDN ................................................................................................
399
PPPoE ...................................................................................................................
402
PPPoE in Action.....................................................................................................
Benefits of PPPoE..................................................................................................
Traditional Dial-up Scenario ...................................................................................
How PPPoE Works ................................................................................................
403
Prestige as a PPPoE Client ...................................................................................
Log Descriptions..................................................................................................
404
Log Commands......................................................................................................
418
Log Command Example.........................................................................................
419
Wireless LANs ......................................................................................................
420
Wireless LAN Topologies .......................................................................................
Channel..................................................................................................................
422
RTS/CTS................................................................................................................
Fragmentation Threshold .......................................................................................
423
Preamble Type .......................................................................................................
424
IEEE 802.1x ...........................................................................................................
425
RADIUS..................................................................................................................
Types of Authentication..........................................................................................
426
WPA .......................................................................................................................
428
Security Parameters Summary ..............................................................................
429
Table of Contents
22