![ZyXEL Communications P-870HN-51B Support Notes Download Page 5](http://html1.mh-extra.com/html/zyxel-communications/p-870hn-51b/p-870hn-51b_support-notes_944196005.webp)
P-870HN-51b Support Notes
All contents copyright (c) 2009 ZyXEL Communications Corporation.
What is the difference between 40-bit and 64-bit WEP? ........................... 117
What is a WEP key? .................................................................................. 117
A WEP key is a user defined string of characters used to encrypt and
decrypt data? .............................................................................................. 117
Can the SSID be encrypted? ...................................................................... 117
By turning off the broadcast of SSID, can someone still sniff the SSID? . 117
What are Insertion Attacks? ....................................................................... 117
What is Wireless Sniffer? .......................................................................... 118
What is the difference between Open System and Shared Key of
Authentication Type? ................................................................................. 118
What is 802.1x? ......................................................................................... 118
What is the difference between No authentication required, No access
allowed and Authentication required? ....................................................... 118
What is AAA? ............................................................................................ 119
What is RADIUS?...................................................................................... 119
What is WPA?............................................................................................ 119
What is WPA-PSK? ................................................................................... 119
Trouble Shooting
...................................................................................................... 120
How to enter the “Shell mode” .................................................................. 120
CPU usage .................................................................................................. 121
Memory usage ............................................................................................ 121
Current processes ....................................................................................... 122
IGMP table ................................................................................................. 122
Packets statistics......................................................................................... 123
Physical layer statistics .............................................................................. 123
CLI Command List
.................................................................................................. 124