P-661H/HW Series User’s Guide

Command Interpreter...........................................................................................

327

Command Syntax...................................................................................................

327

Command Usage ...................................................................................................

327

Appendix G

 

Firewall Commands .............................................................................................

329

Appendix H

 

NetBIOS Filter Commands ..................................................................................

335

Introduction ............................................................................................................

335

Display NetBIOS Filter Settings .............................................................................

335

NetBIOS Filter Configuration..................................................................................

336

Appendix I

 

PPPoE ...................................................................................................................

337

PPPoE in Action.....................................................................................................

337

Benefits of PPPoE..................................................................................................

337

Traditional Dial-up Scenario ...................................................................................

337

How PPPoE Works ................................................................................................

338

ZyXEL Device as a PPPoE Client..........................................................................

338

Appendix J

 

Log Descriptions..................................................................................................

339

Log Commands......................................................................................................

353

Log Command Example.........................................................................................

354

Appendix K

 

Wireless LANs (wireless devices only)..............................................................

355

Wireless LAN Topologies .......................................................................................

355

Channel..................................................................................................................

357

RTS/CTS................................................................................................................

357

Fragmentation Threshold .......................................................................................

358

Preamble Type .......................................................................................................

359

IEEE 802.11g Wireless LAN ..................................................................................

359

Wireless Security Overview ...................................................................................

360

IEEE 802.1x ...........................................................................................................

360

RADIUS..................................................................................................................

361

Types of Authentication..........................................................................................

362

Dynamic WEP Key Exchange................................................................................

363

WPA and WPA2 .....................................................................................................

364

Security Parameters Summary ..............................................................................

367

Table of Contents

21