Command Interpreter........................................................................................... 327
Command Syntax................................................................................................... 327
Command Usage ................................................................................................... 327
Firewall Commands ............................................................................................. 329
Appendix H
Introduction ............................................................................................................ 335
PPPoE in Action..................................................................................................... 337
Benefits of PPPoE.................................................................................................. 337
How PPPoE Works ................................................................................................ 338
Log Descriptions.................................................................................................. 339
Log Commands...................................................................................................... 353
Log Command Example......................................................................................... 354
Appendix K
Wireless LAN Topologies ....................................................................................... 355
Channel.................................................................................................................. 357
RTS/CTS ................................................................................................................ 357
Fragmentation Threshold ....................................................................................... 358
Preamble Type ....................................................................................................... 359
IEEE 802.1x ........................................................................................................... 360
RADIUS.................................................................................................................. 361
Types of Authentication.......................................................................................... 362
WPA and WPA2 ..................................................................................................... 364
Table of Contents
P-661H/HW Series User's Guide
21