P-660H/HW/W-T Series User’ Guide

List of Figures

Figure 1 Protected Internet Access Applications ................................................................

46

Figure 2 LAN-to-LAN Application Example .........................................................................

46

Figure 3 Password Screen ..................................................................................................

49

Figure 4 Change Password at Login ...................................................................................

49

Figure 5 Web Configurator: Site Map Screen ...................................................................

50

Figure 6 Password ..............................................................................................................

52

Figure 7 Internet Access Wizard Setup: ISP Parameters ...................................................

54

Figure 8 Internet Connection with PPPoE ...........................................................................

55

Figure 9 Internet Connection with RFC 1483 .....................................................................

56

Figure 10 Internet Connection with ENET ENCAP .............................................................

57

Figure 11 Internet Connection with PPPoA .........................................................................

58

Figure 12 Internet Access Wizard Setup: Third Screen ......................................................

59

Figure 13 Internet Access Wizard Setup: LAN Configuration ............................................

59

Figure 14 Internet Access Wizard Setup: Connection Tests ...............................................

60

Figure 15 LAN and WAN IP Addresses ..............................................................................

62

Figure 16 Any IP Example ..................................................................................................

67

Figure 17 LAN Setup ...........................................................................................................

68

Figure 18 Wireless LAN ......................................................................................................

72

Figure 19 Wireless Security Methods .................................................................................

73

Figure 20 Wireless Screen ..................................................................................................

74

Figure 21 MAC Filter ...........................................................................................................

76

Figure 22 WPA - PSK Authentication ..................................................................................

78

Figure 23 WPA with RADIUS Application Example2 ..........................................................

79

Figure 24 Wireless LAN: 802.1x/WPA: No Access Allowed ................................................

80

Figure 25 Wireless LAN: 802.1x/WPA: No Authentication ..................................................

80

Figure 26 Wireless LAN: 802.1x/WPA: 802.1xl ...................................................................

81

Figure 27 Wireless LAN: 802.1x/WPA: WPA .......................................................................

83

Figure 28 Wireless LAN: 802.1x/WPA:WPA-PSK ...............................................................

84

Figure 29 Local User Database ..........................................................................................

86

Figure 30 RADIUS ..............................................................................................................

87

Figure 31 Example of Traffic Shaping .................................................................................

94

Figure 32 WAN ...................................................................................................................

95

Figure 33 WAN Setup (PPPoE) ..........................................................................................

96

Figure 34 Traffic Redirect Example .....................................................................................

99

Figure 35 Traffic Redirect LAN Setup .................................................................................

99

Figure 36 WAN Backup .......................................................................................................

100

Figure 37 How NAT Works ..................................................................................................

104

Figure 38 NAT Application With IP Alias .............................................................................

104

List of Figures

24