Page 26 / 421 Scroll up to view Page 21 - 25
List of Figures
P-660HN-FxZ Series User’s Guide
26
Figure 211 Red Hat 9.0: KDE: Network Configuration: Devices
..........................................................
336
Figure 212 Red Hat 9.0: KDE: Ethernet Device: General
..................................................................
336
Figure 213 Red Hat 9.0: KDE: Network Configuration: DNS
...............................................................
337
Figure 214 Red Hat 9.0: KDE: Network Configuration: Activate
........................................................
337
Figure 215 Red Hat 9.0: Dynamic IP Address Setting in ifconfig-eth0
...............................................
338
Figure 216 Red Hat 9.0: Static IP Address Setting in ifconfig-eth0
...................................................
338
Figure 217 Red Hat 9.0: DNS Settings in resolv.conf
........................................................................
338
Figure 218 Red Hat 9.0: Restart Ethernet Card
.................................................................................
338
Figure 219 Red Hat 9.0: Checking TCP/IP Properties
.......................................................................
339
Figure 220 Pop-up Blocker
...................................................................................................................
341
Figure 221 Internet Options: Privacy
....................................................................................................
342
Figure 222 Internet Options: Privacy
....................................................................................................
343
Figure 223 Pop-up Blocker Settings
.....................................................................................................
343
Figure 224 Internet Options: Security
...................................................................................................
344
Figure 225 Security Settings - Java Scripting
.......................................................................................
345
Figure 226 Security Settings - Java
......................................................................................................
345
Figure 227 Java (Sun)
..........................................................................................................................
346
Figure 228 Mozilla Firefox: Tools > Options
.........................................................................................
347
Figure 229 Mozilla Firefox Content Security
.........................................................................................
347
Figure 230 Network Number and Host ID
............................................................................................
350
Figure 231 Subnetting Example: Before Subnetting
............................................................................
352
Figure 232 Subnetting Example: After Subnetting
...............................................................................
353
Figure 233 Peer-to-Peer Communication in an Ad-hoc Network
.........................................................
357
Figure 234 Basic Service Set
...............................................................................................................
358
Figure 235 Infrastructure WLAN
...........................................................................................................
359
Figure 236
RTS/CTS
...........................................................................................................................
360
Figure 237 WPA(2) with RADIUS Application Example
.......................................................................
367
Figure 238 WPA(2)-PSK Authentication
...............................................................................................
368
Figure 239 Configuration Text File Format: Column Descriptions
........................................................
375
Figure 240 Invalid Parameter Entered: Command Line Example
........................................................
376
Figure 241 Valid Parameter Entered: Command Line Example
...........................................................
376
Figure 242 Internal SPTGEN FTP Download Example
........................................................................
377
Figure 243 Internal SPTGEN FTP Upload Example
............................................................................
377
Page 27 / 421
List of Tables
P-660HN-FxZ Series User’s Guide
27
List of Tables
Table 1 LED Descriptions
......................................................................................................................
35
Table 2 Web Configurator Icons in the Title Bar
....................................................................................
42
Table 3 Navigation Panel Summary
......................................................................................................
42
Table 4 Status Screen
............................................................................................................................
45
Table 5 WLAN Status
.............................................................................................................................
48
Table 6 Packet Statistics
........................................................................................................................
49
Table 7 Any IP Table
..............................................................................................................................
50
Table 8 Internet Access Wizard Setup: ISP Parameters
.......................................................................
56
Table 9
Internet Connection with PPPoE
..............................................................................................
57
Table 10 Internet Connection with RFC 1483
........................................................................................
58
Table 11 Internet Connection with ENET ENCAP
.................................................................................
58
Table 12 Internet Connection with PPPoA
.............................................................................................
59
Table 13 Wireless LAN Setup Wizard 1
.................................................................................................
61
Table 14 Wireless LAN Setup Wizard 2
.................................................................................................
62
Table 15 Manually Assign a WPA-PSK key
...........................................................................................
63
Table 16 Manually Assign a WEP key
...................................................................................................
64
Table 17 Network > WAN > Internet Access Setup
...............................................................................
71
Table 18 Network > WAN > Internet Access Setup: Advanced Setup
...................................................
74
Table 19 Network > WAN > More Connections
.....................................................................................
76
Table 20 Network > WAN > More Connections: Edit
.............................................................................
77
Table 21 Network > WAN > More Connections: Edit: Advanced Setup
.................................................
79
Table 22 Network > WAN > WAN Backup
.............................................................................................
81
Table 23 Network > LAN > IP
................................................................................................................
91
Table 24 Network > LAN > IP: Advanced Setup
....................................................................................
92
Table 25 Network > LAN > DHCP Setup
...............................................................................................
94
Table 26 Network > LAN > Client List
....................................................................................................
96
Table 27 Network > LAN > IP Alias
.......................................................................................................
97
Table 28 Network > Wireless LAN > AP
..............................................................................................
107
Table 29 Network > Wireless LAN > AP: No Security
.........................................................................
109
Table 30 Network > Wireless LAN > AP: WEP Auto
............................................................................
110
Table 31 Network > Wireless LAN > AP: WPA(2)-PSK
........................................................................
111
Table 32 Network > Wireless LAN > AP: WPA(2)
.................................................................................
112
Table 33 Network > Wireless LAN > AP: Advanced Setup
...................................................................
114
Table 34 Network > Wireless LAN > AP: MAC Address Filter
..............................................................
115
Table 35 Network > Wireless LAN > More AP
......................................................................................
115
Table 36 Network > Wireless LAN > More AP: Edit
..............................................................................
116
Table 37 Network > Wireless LAN > WPS
............................................................................................
117
Table 38 Network > Wireless LAN > WPS Station
................................................................................
118
Page 28 / 421
List of Tables
P-660HN-FxZ Series User’s Guide
28
Table 39 Network > Wireless LAN > WDS
..........................................................................................
120
Table 40 Network > Wireless LAN > QoS
............................................................................................
120
Table 41 Network > Wireless LAN > QoS
............................................................................................
121
Table 42 Additional Wireless Terms
.....................................................................................................
123
Table 43 Types of Encryption for Each Type of Authentication
...........................................................
125
Table 44 Network > NAT > General
.....................................................................................................
137
Table 45 Network > NAT > Port Forwarding
........................................................................................
139
Table 46 Network > NAT > Port Forwarding: Edit
................................................................................
140
Table 47 Network > NAT > Address Mapping
......................................................................................
141
Table 48 Network > NAT > Address Mapping: Edit
.............................................................................
142
Table 49 Network > NAT > ALG
..........................................................................................................
143
Table 50 NAT Definitions
.....................................................................................................................
144
Table 51 NAT Mapping Types
..............................................................................................................
147
Table 52 Security > Firewall > General
................................................................................................
157
Table 53 Security > Firewall > Rules
...................................................................................................
158
Table 54 Security > Firewall > Rules: Edit
...........................................................................................
160
Table 55 Security > Firewall > Rules: Edit: Edit Customized Services
................................................
162
Table 56 Security > Firewall > Rules: Edit: Edit Customized Services: Config
....................................
163
Table 57 Security > Firewall > Threshold
............................................................................................
165
Table 58 Security > Content Filtering > Keyword
................................................................................
173
Table 59 Security > Content Filter: Schedule
......................................................................................
174
Table 60 Security > Content Filter: Trusted
.........................................................................................
175
Table 61 Security > Packet Filter
.........................................................................................................
178
Table 62 Security > Packet Filter > Edit (Protocol Filter)
.....................................................................
179
Table 63 Security > Packet Filter > Edit (Protocol Filter) > Edit Rule
..................................................
180
Table 64 Security > Packet Filter > Edit (Generic Filter)
......................................................................
182
Table 65 Security > Packet Filter > Edit (Generic Filter) > Edit Rule
...................................................
182
Table 66 My Certificates
......................................................................................................................
187
Table 67 My Certificate Import
.............................................................................................................
189
Table 68 My Certificate Create
............................................................................................................
189
Table 69 My Certificate Details
............................................................................................................
192
Table 70 Trusted CAs
..........................................................................................................................
195
Table 71 Trusted CA Import
.................................................................................................................
196
Table 72 Trusted CA Details
................................................................................................................
197
Table 73 Trusted Remote Hosts
..........................................................................................................
200
Table 74 Trusted Remote Host Import
.................................................................................................
201
Table 75 Trusted Remote Host Details
................................................................................................
202
Table 76 Directory Servers
..................................................................................................................
204
Table 77 Directory Server Add and Edit
..............................................................................................
205
Table 78 Advanced > Static Route
.......................................................................................................
212
Table 79 Advanced > Static Route: Edit
..............................................................................................
213
Table 80 Advanced > 802.1Q/1P > Group Setting
..............................................................................
220
Table 81 Advanced > 802.1Q/1P > Group Setting > Edit
....................................................................
221
Page 29 / 421
List of Tables
P-660HN-FxZ Series User’s Guide
29
Table 82 Advanced > 802.1Q/1P > Port Setting
..................................................................................
222
Table 83 Advanced > QoS > General
..................................................................................................
229
Table 84 Advanced > QoS > Class Setup
...........................................................................................
230
Table 85 Advanced > QoS > Class Setup: Edit
...................................................................................
232
Table 86 Advanced > QoS > Monitor
...................................................................................................
234
Table 87 IEEE 802.1p Priority Level and Traffic Type
.........................................................................
235
Table 88 Internal Layer2 and Layer3 QoS Mapping
............................................................................
236
Table 89 Advanced > Dynamic DNS
...................................................................................................
240
Table 90 Advanced > Remote Management > WWW
.........................................................................
246
Table 91 Advanced > Remote Management > Telnet
..........................................................................
247
Table 92 Advanced > Remote Management > FTP
............................................................................
248
Table 93 SNMP Traps
..........................................................................................................................
250
Table 94 Advanced > Remote Management > SNMP
.........................................................................
251
Table 95 Advanced > Remote Management > DNS
............................................................................
252
Table 96 Advanced > Remote Management > ICMP
..........................................................................
253
Table 97 Advanced > UPnP > General
................................................................................................
256
Table 98 Maintenance > System > General
........................................................................................
270
Table 99 Maintenance > System > Time Setting
.................................................................................
272
Table 100 Maintenance > Logs > View Log
.........................................................................................
276
Table 101 Maintenance > Logs > Log Settings
...................................................................................
277
Table 102 SMTP Error Messages
........................................................................................................
278
Table 103 System Maintenance Logs
..................................................................................................
279
Table 104 System Error Logs
..............................................................................................................
280
Table 105 Access Control Logs
...........................................................................................................
281
Table 106 TCP Reset Logs
..................................................................................................................
281
Table 107 Packet Filter Logs
...............................................................................................................
282
Table 108 ICMP Logs
..........................................................................................................................
282
Table 109 CDR Logs
...........................................................................................................................
282
Table 110 PPP Logs
............................................................................................................................
282
Table 111 UPnP Logs
..........................................................................................................................
283
Table 112 Content Filtering Logs
.........................................................................................................
283
Table 113 Attack Logs
..........................................................................................................................
283
Table 114 802.1X Logs
........................................................................................................................
284
Table 115 ACL Setting Notes
...............................................................................................................
284
Table 116 ICMP Notes
.........................................................................................................................
285
Table 117 Syslog Logs
.........................................................................................................................
286
Table 118 RFC-2408 ISAKMP Payload Types
....................................................................................
286
Table 119 Filename Conventions
........................................................................................................
288
Table 120 General Commands for GUI-based FTP Clients
................................................................
292
Table 121 General Commands for GUI-based TFTP Clients
..............................................................
293
Table 122 Maintenance > Tools > Firmware
........................................................................................
294
Table 123 Restore Configuration
.........................................................................................................
296
Table 124 Maintenance > Diagnostic > General
..................................................................................
300
Page 30 / 421
List of Tables
P-660HN-FxZ Series User’s Guide
30
Table 125 Maintenance > Diagnostic > DSL Line
................................................................................
301
Table 126 Hardware Specifications
.....................................................................................................
305
Table 127 Firmware Specifications
......................................................................................................
305
Table 128 Wireless Features
...............................................................................................................
308
Table 129 Standards Supported
..........................................................................................................
309
Table 130 ZyXEL Device Series Power Adaptor Specifications
..........................................................
310
Table 131 Subnet Masks
.....................................................................................................................
350
Table 132 Subnet Masks
.....................................................................................................................
351
Table 133 Maximum Host Numbers
....................................................................................................
351
Table 134 Alternative Subnet Mask Notation
.......................................................................................
351
Table 135 Subnet 1
..............................................................................................................................
353
Table 136 Subnet 2
..............................................................................................................................
354
Table 137 Subnet 3
..............................................................................................................................
354
Table 138 Subnet 4
..............................................................................................................................
354
Table 139 Eight Subnets
......................................................................................................................
354
Table 140 24-bit Network Number Subnet Planning
............................................................................
355
Table 141 16-bit Network Number Subnet Planning
............................................................................
355
Table 142 IEEE 802.11g
......................................................................................................................
361
Table 143 Wireless Security Levels
.....................................................................................................
362
Table 144 Comparison of EAP Authentication Types
..........................................................................
365
Table 145 Wireless Security Relational Matrix
....................................................................................
368
Table 146 Examples of Services
.........................................................................................................
371
Table 147 Abbreviations Used in the Example Internal SPTGEN Screens Table
...............................
377
Table 148 Menu 1 General Setup
........................................................................................................
378
Table 149 Menu 3
................................................................................................................................
378
Table 150 Menu 4 Internet Access Setup
............................................................................................
381
Table 151 Menu 12
..............................................................................................................................
383
Table 152 Menu 15 SUA Server Setup
................................................................................................
387
Table 153 Menu 21.1 Filter Set #1
.......................................................................................................
389
Table 154 Menu 21.1 Filer Set #2
........................................................................................................
392
Table 155 Menu 23 System Menus
.....................................................................................................
396
Table 156 Menu 24.11 Remote Management Control
.........................................................................
397
Table 157 Command Examples
...........................................................................................................
397

Rate

4 / 5 based on 1 vote.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top