ZyXEL Communications P-334WT User Manual page 10

802.11g wireless broadband router with firewall
Hide thumbs Also See for P-334WT:
Table of Contents

Advertisement

P-334WT User's Guide
Connection Wizard................................................................................................. 65
3.1 Wizard Setup ......................................................................................................65
3.2 Connection Wizard: STEP 1: System Information .............................................66
3.3 Connection Wizard: STEP 2: Wireless LAN .......................................................67
3.4 Connection Wizard: STEP 3: Internet Configuration ..........................................71
3.5 Connection Wizard: STEP 4: Bandwidth management ......................................80
3.6 Connection Wizard Complete ............................................................................80
Wireless LAN .......................................................................................................... 83
4.1 Introduction ........................................................................................................83
4.2 Wireless Security Overview ...............................................................................83
4.3 Configuring Wireless LAN on the Prestige .........................................................84
10
2.4.7 Summary: Packet Statistics .......................................................................60
2.4.8 Summary: Port Isolation ...........................................................................61
2.4.9.1 WMM QoS .......................................................................................62
3.2.1 System Name ...........................................................................................66
3.2.2 Domain Name ...........................................................................................67
3.3.1 Basic(WEP) Security .................................................................................68
3.3.2 Extend(WPA-PSK or WPA2-PSK) Security ...............................................70
3.3.3 OTIST ........................................................................................................70
3.4.1 Ethernet Connection .................................................................................72
3.4.2 PPPoE Connection ...................................................................................73
3.4.3 PPTP Connection .....................................................................................74
3.4.4 Your IP Address .........................................................................................75
3.4.5 WAN IP Address Assignment ...................................................................76
3.4.6 IP Address and Subnet Mask ...................................................................76
3.4.7 DNS Server Address Assignment .............................................................77
3.4.8 WAN IP and DNS Server Address Assignment .........................................77
3.4.9 WAN MAC Address ...................................................................................79
4.2.1 Encryption .................................................................................................83
4.2.2 Authentication ...........................................................................................83
4.2.3 Restricted Access .....................................................................................84
4.2.4 Hide Prestige Identity ................................................................................84
4.2.5 G-plus .......................................................................................................84
4.2.6 Using OTIST .............................................................................................84
4.4.1 No Security ...............................................................................................86
4.4.2 WEP Encryption ........................................................................................87
4.4.3 Static WEP Encryption ..............................................................................87
.........................................................62
.......................................................................85
Table of Contents

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents