RADIUS.................................................................................................................. 366
Types of Authentication.......................................................................................... 367
WPA ....................................................................................................................... 369
Appendix F
Services ................................................................................................................ 371
Firewall Commands ............................................................................................. 375
Sys Firewall Commands ........................................................................................ 375
Triangle Route ...................................................................................................... 377
The Ideal Setup...................................................................................................... 377
IP Aliasing .............................................................................................................. 378
Log Descriptions.................................................................................................. 381
Log Commands...................................................................................................... 390
Log Command Example......................................................................................... 392
Command Interpreter........................................................................................... 393
Command Syntax................................................................................................... 393
Command Usage ................................................................................................... 393
Internal SPTGEN .................................................................................................. 395
Table of Contents
PEAP (Protected EAP) .................................................................................... 368
LEAP................................................................................................................ 368
User Authentication ........................................................................................ 369
Encryption ....................................................................................................... 369
Displaying Logs ............................................................................................... 391
P-2602H(W)(L)-DxA Series User's Guide
21