Command Usage ................................................................................................... 386
Firewall Commands ............................................................................................. 388
Appendix H
Introduction ............................................................................................................ 394
Appendix I
Telephone Microfilters ............................................................................................ 398
Prestige With ISDN ................................................................................................ 399
PPPoE in Action..................................................................................................... 402
Benefits of PPPoE.................................................................................................. 402
How PPPoE Works ................................................................................................ 403
Log Descriptions.................................................................................................. 404
Log Commands...................................................................................................... 418
Log Command Example......................................................................................... 419
Wireless LANs ...................................................................................................... 420
Wireless LAN Topologies ....................................................................................... 420
Channel.................................................................................................................. 422
RTS/CTS ................................................................................................................ 422
Fragmentation Threshold ....................................................................................... 423
Preamble Type ....................................................................................................... 424
IEEE 802.1x ........................................................................................................... 425
RADIUS.................................................................................................................. 425
Types of Authentication.......................................................................................... 426
WPA ....................................................................................................................... 428
Table of Contents
P-660H/HW/W-T Series User' Guide
22