Manual De UsuarioTabla de contenidosFAQ6ZyNOS FAQ61. What is ZyNOS?62. What’s Multilingual Embedded Web Configurator?64. How do I update the firmware and configuration file?6program via LAN?6program via LAN?77. What should I do if I forget the system password?78. How to use the Reset button?79. What is SUA? When should I use SUA?810. What is the difference between SUA and Full Feature NAT?8Internet? If possible, how?912. When do I need select Full Feature NAT?913. What IP/Port mapping does Multi-NAT support?914. How many network users can the SUA/NAT support?1015. What are Device filters and Protocol filters?1016. How can I protect against IP spoofing attacks?11Product FAQ121. How can I manage P-660HW-Tx v2?122. What is the default password for Web Configurator?12‘Administrator Account’?12ISP?125. What is the micro filter or splitter used for?13difference between them?137. How do I know I am using PPPoE?138. Why does my provider use PPPoE?139. What is DDNS?1310. When do I need DDNS service?14wildcard?14IPSec gateway?14SUA?1514. What is Traffic Shaping?1515. Why do we perform traffic shaping in the P-660HW-Tx v2?1516. What do the parameters (PCR, SCR, MBS) mean?1618. What is content filter?17ADSL FAQ181. How does ADSL compare to Cable modems?182. What is the expected throughput?183. What is the microfilter used for?184. How do I know the ADSL line is up?185. How does the P-660HW-Tx v2 work on a noisy ADSL?18multiplexing?197. How do I know the details of my ADSL line statistics?198. What are the signaling pins of the ADSL connector?199. What is triple play?19Firewall FAQ21General211. What is a network firewall?212. What makes P-660HW-Tx v2 secure?213. What are the basic types of firewalls?214. What kind of firewall is the P-660HW-Tx v2?22filtering and NAT built-in?226. What is Denials of Service (DoS) attack?227. What is Ping of Death attack?238. What is Teardrop attack?239. What is SYN Flood attack?2310. What is LAND attack?2311 What is Brute-force attack?2412. What is IP Spoofing attack?24Configuration241. How do I configure the firewall?242. How do I prevent others from configuring my firewall?24Configurator/Telnet over WAN?25FTP over WAN?26Log and Alert272. What does the log show to us?273. How do I view the firewall log?275. What is the difference between the log and alert?28Wireless FAQ29General FAQ291. What is a Wireless LAN?292. What are the advantages of Wireless LAN?293. What is the disadvantage of Wireless LAN?294. Where can you find 802.11 wireless networks?305. What is an Access Point?306. What is IEEE 802.11?307. What is 802.11b?308. How fast is 802.11b?309. What is 802.11a?3010. What is 802.11g?3112. What is Wi-Fi?3113. What types of devices use the 2.4GHz Band?3114. Does the 802.11 interfere with Bluetooth device?3115. Can radio signals pass through wall?31among WLAN products?3217. What's the difference between a WLAN and a WWAN?32any hardware?3219. Does P-660HW-Tx v2 support WEP?3221. Does P-660HW-Tx v2 support MAC filtering?3222. Does P-660HW-Tx v2 support auto rate adaption?33Advanced FAQ331. What is Ad Hoc mode?332. What is Infrastructure mode?333. How many Access Points are required in a given area?.33(DSSS)?33(FHSS)?337. Why the 2.4 Ghz Frequency range?348. What is Server Set ID (SSID)?349. What is an ESSID?34Security FAQ34Point's radio link?342. What is WEP?343. What is WPA?354. What is the difference between 40-bit and 64-bit WEP?.355. What is a WEP key?356. Will 128-bit WEP communicate with 64-bit WEP?357. Can the SSID be encrypted?36the SSID?369. What are Insertion Attacks?.3610. What is Wireless Sniffer?.3611. What is OTIST? How do I use it?36Application Notes37General Application Notes373. Setup the P-660HW-Tx v2 as a DHCP Relay414. SUA Notes425. Using Full Feature NAT516. Using the Dynamic DNS (DDNS)637. Network Management Using SNMP658. Using syslog689. Using IP Alias6810. Using IP Policy Routing7011. Using Call Scheduling7412. Using IP Multicast7613. Using Bandwidth Management7714. Using Zero-Configuration8015. How could I configure triple play on P-660HW-Tx v2?8316. How to configure packet filter on P-660HW-Tx v2?83Wireless Application Notes871. Configure a Wireless Client to Ad hoc mode872. Configuring Infrastructure mode913. MAC Filter954. Setup WEP (Wired Equivalent Privacy)975. Site Survey1026. Configure 802.1x and WPA105Support Tool1101. LAN/WAN Packet Trace110Online Trace110Offline Trace112Capture the detailed logs by Hyper Terminal113Using TFTP client software115Using TFTP command on Windows NT117Using TFTP command on UNIX1173. Using FTP to Upload the Firmware and Configuration Files118CI Command Reference121Tamaño: 2 MBPáginas: 122Language: EnglishManuales abiertas