User's Manual

Table Of Contents
P-660H/HW-D Series User’s Guide
19 Table of Contents
Appendix I
NetBIOS Filter Commands .................................................................................. 306
Introduction ............................................................................................................ 306
Display NetBIOS Filter Settings ............................................................................. 306
NetBIOS Filter Configuration.................................................................................. 307
Appendix J
Splitters and Microfilters ..................................................................................... 308
Connecting a POTS Splitter ................................................................................... 308
Telephone Microfilters ............................................................................................ 308
ZyXEL Device With ISDN....................................................................................... 310
Appendix K
Log Descriptions.................................................................................................. 312
Log Commands...................................................................................................... 326
Log Command Example......................................................................................... 327
Appendix L
Wireless LANs ...................................................................................................... 328
Wireless LAN Topologies ....................................................................................... 328
Channel.................................................................................................................. 330
RTS/CTS................................................................................................................ 330
Fragmentation Threshold ....................................................................................... 331
Preamble Type ....................................................................................................... 332
IEEE 802.11g Wireless LAN .................................................................................. 332
Wireless Security Overview ................................................................................... 333
IEEE 802.1x ........................................................................................................... 333
RADIUS.................................................................................................................. 334
Types of Authentication.......................................................................................... 335
Dynamic WEP Key Exchange................................................................................ 336
WPA and WPA2 ..................................................................................................... 337
21.4.2 WPA(2)-PSK Application Example .......................................................339
Security Parameters Summary .............................................................................. 340
Appendix M
Pop-up Windows, JavaScripts and Java Permissions ..................................... 342
Internet Explorer Pop-up Blockers ......................................................................... 342
JavaScripts............................................................................................................. 345
Appendix N
Triangle Route ...................................................................................................... 350