P-660HW-Tx v2 Series Support Notes
4. What is the difference between 40-bit and 64-bit WEP?. .....35
5. What is a WEP key?.............................................................35
6. Will 128-bit WEP communicate with 64-bit WEP? ................35
7. Can the SSID be encrypted? ................................................36
8. By turning off the broadcast of SSID, can someone still sniff
the SSID? .................................................................................36
9. What are Insertion Attacks?. ................................................36
10. What is Wireless Sniffer?. ..................................................36
11. What is OTIST? How do I use it? .......................................36
.....................................................................................37
...................................................................37
1. Internet Access Using P-660HW-Tx v2 under Bridge mode.37
2. Internet Access Using P-660HW-Tx v2 under Routing mode
.................................................................................................39
3. Setup the P-660HW-Tx v2 as a DHCP Relay.......................41
4. SUA Notes............................................................................42
5. Using Full Feature NAT ........................................................51
6. Using the Dynamic DNS (DDNS) .........................................63
7. Network Management Using SNMP .....................................65
8. Using syslog .........................................................................68
9. Using IP Alias .......................................................................68
10. Using IP Policy Routing ......................................................70
11. Using Call Scheduling ........................................................74
12. Using IP Multicast...............................................................76
13. Using Bandwidth Management...........................................77
14. Using Zero-Configuration ...................................................80
15. How could I configure triple play on P-660HW-Tx v2? .......83
16. How to configure packet filter on P-660HW-Tx v2? ............83
..................................................................87
1. Configure a Wireless Client to Ad hoc mode ........................87
2. Configuring Infrastructure mode ...........................................91
3. MAC Filter ............................................................................95
4. Setup WEP (Wired Equivalent Privacy)................................97
5. Site Survey .........................................................................102
6. Configure 802.1x and WPA ................................................105
...........................................................................................110
1. LAN/WAN Packet Trace ...................................................................110
Online Trace .................................................................110
Offline Trace .................................................................112
Capture the detailed logs by Hyper Terminal................113
2. Firmware/Configurations Uploading and Downloading using TFTP..115
Using TFTP client software...........................................115
Using TFTP command on Windows NT........................117
Using TFTP command on UNIX ...................................117
4
All contents copyright © 2006 ZyXEL Communications Corporation.