P-660H/HW/W-T Series User’ Guide

Command Usage ...................................................................................................

386

Appendix G

 

Firewall Commands .............................................................................................

388

Appendix H

 

NetBIOS Filter Commands ..................................................................................

394

Introduction ............................................................................................................

394

Display NetBIOS Filter Settings .............................................................................

394

NetBIOS Filter Configuration..................................................................................

395

Appendix I

 

Splitters and Microfilters .....................................................................................

398

Connecting a POTS Splitter ...................................................................................

398

Telephone Microfilters ............................................................................................

398

Prestige With ISDN ................................................................................................

399

Appendix J

 

PPPoE ...................................................................................................................

402

PPPoE in Action.....................................................................................................

402

Benefits of PPPoE..................................................................................................

402

Traditional Dial-up Scenario ...................................................................................

402

How PPPoE Works ................................................................................................

403

Prestige as a PPPoE Client ...................................................................................

403

Appendix K

 

Log Descriptions..................................................................................................

404

Log Commands......................................................................................................

418

Log Command Example.........................................................................................

419

Appendix L

 

Wireless LANs ......................................................................................................

420

Wireless LAN Topologies .......................................................................................

420

Channel..................................................................................................................

422

RTS/CTS................................................................................................................

422

Fragmentation Threshold .......................................................................................

423

Preamble Type .......................................................................................................

424

IEEE 802.1x ...........................................................................................................

425

RADIUS..................................................................................................................

425

Types of Authentication..........................................................................................

426

WPA .......................................................................................................................

428

Security Parameters Summary ..............................................................................

429

Table of Contents

22