P-660HW-T v2 User’s Guide
20
Table of Contents
NetBIOS Filter Configuration
..................................................................................
316
Appendix J
Splitters and Microfilters
.....................................................................................
317
Connecting a POTS Splitter
...................................................................................
317
Telephone Microfilters
............................................................................................
317
ZyXEL Device With ISDN
.......................................................................................
319
Appendix K
Wireless LANs
......................................................................................................
321
Wireless LAN Topologies
.......................................................................................
321
Channel
..................................................................................................................
323
RTS/CTS
................................................................................................................
323
Fragmentation Threshold
.......................................................................................
324
Preamble Type
.......................................................................................................
325
IEEE 802.11g Wireless LAN
..................................................................................
325
Wireless Security Overview
...................................................................................
326
RADIUS
..................................................................................................................
326
Types of Authentication
..........................................................................................
327
Dynamic WEP Key Exchange
................................................................................
329
WPA and WPA2
.....................................................................................................
329
Security Parameters Summary
..............................................................................
333
Appendix L
Pop-up Windows, JavaScripts and Java Permissions
.....................................
335
Internet Explorer Pop-up Blockers
.........................................................................
335
JavaScripts
.............................................................................................................
338
Appendix M
Triangle Route
......................................................................................................
343
The Ideal Setup
......................................................................................................
343
The “Triangle Route” Problem
................................................................................
343
The “Triangle Route” Solutions
..............................................................................
344
IP Aliasing
..............................................................................................................
344
Index
......................................................................................................................
345