ユーザーズマニュアル目次Prestige 320W1802.11g Wireless Firewall Router1Support Notes1Application Notes5General Application Notes5Internet Connection5Configure an Internal Server Behind SUA 9Using the Dynamic DNS (DDNS)11Network Management Using SNMP12Using Prestige traffic redirect18Using Universal Plug n Play (UPnP)19WLAN Application Notes24Infrastructure Mode24Wireless MAC Address Filtering29WEP Configuration31IEEE 802.1x37Site Survey46FAQ50Product FAQ50What is the P320W 802.11g Wireless Firewall Router?50Will the P320W work with my Internet connection?51What do I need to use the Prestige?51Does the Prestige support PPPoE?51How do I know I am using PPPoE?52Why does my provider use PPPoE?52Which Internet Applications can I use with the Prestige?52How can I configure the Prestige?52What network interface does the Prestige support?52What can we do with Prestige?52Does Prestige support dynamic IP addressing?52What is the difference between the internal IP and the real53How does e-mail work through the Prestige?53What is the main difference between WinGate and the Prestige53Is it possible to access a server running behind SUA from th54What DHCP capability does the Prestige support?54What network interface does the new Prestige series support?54How can I upload data to outside Internet over the one-way c54How fast can the data go? 54My Prestige can not get an IP address from the ISP to connec55What is BOOTP/DHCP57What is DDNS57When do I need DDNS service?58What DDNS servers does the Prestige support?58What is DDNS wildcard?58Does the Prestige support DDNS wildcard?58Why can't I use video conferencing with MSN 4.6?58Should I create any firewall rule by myself to allow incomin58Firewall FAQ59What is a network firewall?59What makes P320W secure?59What are the basic types of firewalls?59What kind of firewall is the P320W?60Why do you need a firewall when your router has packet filte60What is Denials of Service (DoS) attack?60What is Ping of Death attack?61What is Teardrop attack?61What is SYN Flood attack?61What is LAND attack?61What is Brute-force attack?61What is IP Spoofing attack?62Wireless FAQ62What is a Wireless LAN?62What are the advantages of Wireless LANs?62What are the disadvantages of Wireless LANs?63Where can you find wireless 802.11 networks?63What is an Access Point?63What is IEEE 802.11?64What is 802.11b?64How fast is 802.11b?64What is 802.11a?64What is 802.11g?64Is it possible to use products from a variety of vendors?65What is Wi-Fi?65What types of devices use the 2.4GHz Band?65Does the 802.11 interfere with Bluetooth devices?65Can radio signals pass through walls?65What are potential factors that may causes interference amon66What's the difference between a WLAN and a WWAN?66What is Ad Hoc mode?66What is Infrastructure mode?66How many Access Points are required in a given area?66What is Direct-Sequence Spread Spectrum Technology – (DSSS)?67What is Frequency-hopping Spread Spectrum Technology – (FHSS67Do I need the same kind of antenna on both sides of a link?67Why the 2.4 Ghz Frequency range?67What is Server Set ID (SSID)?67What is an ESSID?68 How do I secure the data across an Access Point's radio lin68What is WEP?68What is the difference between 40-bit and 64-bit WEP?68What is a WEP key? 68Will 128-bit WEP communicate with 64-bit WEP?68Can the SSID be encrypted?69By turning off the broadcast of SSID, can someone still snif69What are Insertion Attacks?69What is Wireless Sniffer?69What is the difference between Open System and Shared Key of69What is 802.1x?70What is the difference between force-authorized, force-unaut70What is AAA?70What is RADIUS?70Trouble Shooting71Why none of the LEDs turn on when connect the Prestige’s pow71Why cannot access the Prestige from my computer?71Why cannot access the Internet?71Unable to run applications73サイズ: 1.63MBページ数: 75Language: Englishマニュアルを開く