ZyXEL Communications VANTAGE CNM User Manual page 18

Centralized network management
Hide thumbs Also See for VANTAGE CNM:
Table of Contents

Advertisement

Vantage CNM User's Guide
Example: Two Subnets .......................................................................................... 354
Example: Four Subnets.......................................................................................... 356
Example Eight Subnets .......................................................................................... 357
Subnetting With Class A and Class B Networks. ................................................... 358
Appendix F
Setting up Your Computer's IP Address............................................................ 360
Windows 95/98/Me................................................................................................. 360
Installing Components............................................................................................ 361
Configuring............................................................................................................. 362
Verifying Settings ................................................................................................... 363
Windows 2000/NT/XP ............................................................................................ 363
Verifying Settings ................................................................................................... 367
Macintosh OS 8/9................................................................................................... 367
Verifying Settings ................................................................................................... 369
Macintosh OS X ..................................................................................................... 369
Verifying Settings ................................................................................................... 370
Appendix G
Virtual Circuit Topology ...................................................................................... 372
Introduction ............................................................................................................ 372
Appendix H
Wireless LAN and IEEE 802.11 ........................................................................... 374
Benefits of a Wireless LAN .................................................................................... 374
IEEE 802.11 ........................................................................................................... 374
Ad-hoc Wireless LAN Configuration....................................................................... 375
Infrastructure Wireless LAN Configuration............................................................. 375
Appendix I
Wireless LAN With IEEE 802.1x .......................................................................... 378
Security Flaws with IEEE 802.11 ........................................................................... 378
Deployment Issues with IEEE 802.11 .................................................................... 378
IEEE 802.1x ........................................................................................................... 378
Advantages of the IEEE 802.1x ............................................................................. 378
Appendix J
Types of EAP Authentication .............................................................................. 380
Introduction ............................................................................................................ 380
EAP-MD5 (Message-Digest Algorithm 5)............................................................... 380
EAP-TLS (Transport Layer Security)...................................................................... 380
17
RADIUS Server Authentication Sequence....................................................... 379
Table of Contents

Advertisement

Table of Contents
loading

Table of Contents