P-660H/HW/W-T Series User’ Guide
List of Figures
Figure 1 Protected Internet Access Applications ................................................................
46
Figure 2 LAN-to-LAN Application Example .........................................................................
Figure 3 Password Screen ..................................................................................................
49
Figure 4 Change Password at Login ...................................................................................
Figure 5 Web Configurator: Site Map Screen ...................................................................
50
Figure 6 Password ..............................................................................................................
52
Figure 7 Internet Access Wizard Setup: ISP Parameters ...................................................
54
Figure 8 Internet Connection with PPPoE ...........................................................................
55
Figure 9 Internet Connection with RFC 1483 .....................................................................
56
Figure 10 Internet Connection with ENET ENCAP .............................................................
57
Figure 11 Internet Connection with PPPoA .........................................................................
58
Figure 12 Internet Access Wizard Setup: Third Screen ......................................................
59
Figure 13 Internet Access Wizard Setup: LAN Configuration ............................................
Figure 14 Internet Access Wizard Setup: Connection Tests ...............................................
60
Figure 15 LAN and WAN IP Addresses ..............................................................................
62
Figure 16 Any IP Example ..................................................................................................
67
Figure 17 LAN Setup ...........................................................................................................
68
Figure 18 Wireless LAN ......................................................................................................
72
Figure 19 Wireless Security Methods .................................................................................
73
Figure 20 Wireless Screen ..................................................................................................
74
Figure 21 MAC Filter ...........................................................................................................
76
Figure 22 WPA - PSK Authentication ..................................................................................
78
Figure 23 WPA with RADIUS Application Example2 ..........................................................
79
Figure 24 Wireless LAN: 802.1x/WPA: No Access Allowed ................................................
80
Figure 25 Wireless LAN: 802.1x/WPA: No Authentication ..................................................
Figure 26 Wireless LAN: 802.1x/WPA: 802.1xl ...................................................................
81
Figure 27 Wireless LAN: 802.1x/WPA: WPA .......................................................................
83
Figure 28 Wireless LAN: 802.1x/WPA:WPA-PSK ...............................................................
84
Figure 29 Local User Database ..........................................................................................
86
Figure 30 RADIUS ..............................................................................................................
87
Figure 31 Example of Traffic Shaping .................................................................................
94
Figure 32 WAN ...................................................................................................................
95
Figure 33 WAN Setup (PPPoE) ..........................................................................................
96
Figure 34 Traffic Redirect Example .....................................................................................
99
Figure 35 Traffic Redirect LAN Setup .................................................................................
Figure 36 WAN Backup .......................................................................................................
100
Figure 37 How NAT Works ..................................................................................................
104
Figure 38 NAT Application With IP Alias .............................................................................
24