ZyXEL Communications P-660H-T Series User Manual

Page of 466
P-660H/HW-T Series User’ Guide
List of Figures
24
List of Figures
Figure 1 Protected Internet Access Applications  ................................................................ 46
Figure 2 LAN-to-LAN Application Example  ......................................................................... 46
Figure 3 P-660H-T FrontPanel LEDs     ............................................................................... 47
Figure 4 Password Screen .................................................................................................. 49
Figure 5 Change Password at Login ................................................................................... 49
Figure 6  Web Configurator: Site Map Screen  ................................................................... 50
Figure 7 Password  .............................................................................................................. 52
Figure 8 Internet Access Wizard Setup: ISP Parameters ................................................... 54
Figure 9 Internet Connection with PPPoE ........................................................................... 55
Figure 10  Internet Connection with RFC 1483 ................................................................... 56
Figure 11 Internet Connection with ENET ENCAP ............................................................. 57
Figure 12 Internet Connection with PPPoA ......................................................................... 58
Figure 13 Internet Access Wizard Setup: Third Screen  ...................................................... 59
Figure 14 Internet Access Wizard Setup: LAN Configuration   ............................................ 59
Figure 15 Internet Access Wizard Setup: Connection Tests  ............................................... 60
Figure 16 LAN and WAN IP Addresses  .............................................................................. 62
Figure 17 Any IP Example  .................................................................................................. 67
Figure 18 LAN Setup ........................................................................................................... 68
Figure 19 Wireless LAN  ...................................................................................................... 72
Figure 20 Wireless Security Methods  ................................................................................. 73
Figure 21 Wireless Screen .................................................................................................. 74
Figure 22 MAC Filter  ........................................................................................................... 76
Figure 23 WPA - PSK Authentication .................................................................................. 78
Figure 24 WPA with RADIUS Application Example2 .......................................................... 79
Figure 25 Wireless LAN: 802.1x/WPA: No Access Allowed ................................................ 80
Figure 26 Wireless LAN: 802.1x/WPA: No Authentication .................................................. 80
Figure 27 Wireless LAN: 802.1x/WPA: 802.1xl ................................................................... 81
Figure 28 Wireless LAN: 802.1x/WPA: WPA ....................................................................... 83
Figure 29 Wireless LAN: 802.1x/WPA:WPA-PSK  ............................................................... 84
Figure 30 Local User Database .......................................................................................... 86
Figure 31 RADIUS  .............................................................................................................. 87
Figure 32 Example of Traffic Shaping  ................................................................................. 94
Figure 33 WAN  ................................................................................................................... 95
Figure 34 WAN Setup (PPPoE)  .......................................................................................... 96
Figure 35 Traffic Redirect Example ..................................................................................... 99
Figure 36 Traffic Redirect LAN Setup  ................................................................................. 99
Figure 37 WAN Backup ....................................................................................................... 100
Figure 38 How NAT Works .................................................................................................. 104