P-2602H(W)(L)-DxA Series User’s Guide
Table of Contents
21
RADIUS
..................................................................................................................
366
Types of RADIUS Messages
...........................................................................
366
Types of Authentication
..........................................................................................
367
EAP-MD5 (Message-Digest Algorithm 5)
........................................................
367
EAP-TLS (Transport Layer Security)
...............................................................
368
EAP-TTLS (Tunneled Transport Layer Service)
..............................................
368
PEAP (Protected EAP)
....................................................................................
368
LEAP
................................................................................................................
368
Dynamic WEP Key Exchange
.........................................................................
368
WPA
.......................................................................................................................
369
User Authentication
........................................................................................
369
Encryption
.......................................................................................................
369
Security Parameters Summary
..............................................................................
370
Appendix F
Services
................................................................................................................
371
Appendix G
Firewall Commands
.............................................................................................
375
Sys Firewall Commands
........................................................................................
375
Appendix H
Triangle Route
......................................................................................................
377
The Ideal Setup
......................................................................................................
377
The “Triangle Route” Problem
................................................................................
377
The “Triangle Route” Solutions
..............................................................................
378
IP Aliasing
..............................................................................................................
378
Gateways on the WAN Side
...................................................................................
379
Appendix I
Log Descriptions
..................................................................................................
381
Log Commands
......................................................................................................
390
Configuring What You Want the ZyXEL Device to Log
....................................
390
Displaying Logs
...............................................................................................
391
Log Command Example
.........................................................................................
392
Appendix J
Command Interpreter
...........................................................................................
393
Command Syntax
...................................................................................................
393
Command Usage
...................................................................................................
393
Appendix K
Internal SPTGEN
..................................................................................................
395