P-660HW-T v2 User’s Guide
List of Figures
25
Figure 168 Red Hat 9.0: KDE: Ethernet Device: General
.................................................
293
Figure 169 Red Hat 9.0: KDE: Network Configuration: DNS
.............................................
294
Figure 170 Red Hat 9.0: KDE: Network Configuration: Activate
.......................................
294
Figure 171 Red Hat 9.0: Dynamic IP Address Setting in ifconfig-eth0
..............................
295
Figure 172 Red Hat 9.0: Static IP Address Setting in ifconfig-eth0
..................................
295
Figure 173 Red Hat 9.0: DNS Settings in resolv.conf
......................................................
295
Figure 174 Red Hat 9.0: Restart Ethernet Card
................................................................
296
Figure 175 Red Hat 9.0: Checking TCP/IP Properties
......................................................
296
Figure 176 Displaying Log Categories Example
.................................................................
306
Figure 177 Displaying Log Parameters Example
................................................................
306
Figure 178 Connecting a POTS Splitter
..............................................................................
317
Figure 179 Connecting a Microfilter
....................................................................................
318
Figure 180 Connecting a Microfilter and Y-Connector
........................................................
318
Figure 181 ZyXEL Device with ISDN
..................................................................................
319
Figure 182 Peer-to-Peer Communication in an Ad-hoc Network
........................................
321
Figure 183 Basic Service Set
..............................................................................................
322
Figure 184 Infrastructure WLAN
.........................................................................................
323
Figure 185 RTS/CTS
...........................................................................................................
324
Figure 186 WPA(2) with RADIUS Application Example
......................................................
332
Figure 187 WPA(2)-PSK Authentication
.............................................................................
332
Figure 188 Pop-up Blocker
.................................................................................................
335
Figure 189 Internet Options
................................................................................................
336
Figure 190 Internet Options (2)
...........................................................................................
337
Figure 191 Pop-up Blocker Settings
...................................................................................
338
Figure 192 Internet Options (3)
...........................................................................................
339
Figure 193 Security Settings - Java Scripting
.....................................................................
340
Figure 194 Security Settings - Java
....................................................................................
341
Figure 195 Java (Sun)
.........................................................................................................
342
Figure 196 Ideal Setup
........................................................................................................
343
Figure 197 “Triangle Route” Problem
..................................................................................
344
Figure 198 IP Alias
..............................................................................................................
344