ZyXEL Communications 2602HW Series Network Router User Manual


 
Prestige 2602HW Series User’s Guide
21
Appendix G
Types of EAP Authentication.............................................................................. 405
EAP-MD5 (Message-Digest Algorithm 5)............................................................... 405
EAP-TLS (Transport Layer Security) ..................................................................... 405
EAP-TTLS (Tunneled Transport Layer Service) ................................................... 405
LEAP ...................................................................................................................... 406
Appendix H
Triangle Route ...................................................................................................... 407
The Ideal Setup...................................................................................................... 407
The “Triangle Route” Problem................................................................................ 407
The “Triangle Route” Solutions .............................................................................. 408
IP Aliasing .............................................................................................................. 408
Gateways on the WAN Side................................................................................... 408
Appendix I
Example Internal SPTGEN Screens.................................................................... 411
Command Examples.............................................................................................. 432
Appendix J
Command Interpreter........................................................................................... 433
Command Syntax................................................................................................... 433
Command Usage ................................................................................................... 433
Appendix K
Firewall Commands ............................................................................................. 435
Appendix K Sys Firewall Commands .....................................................................435
Appendix L
Boot Commands .................................................................................................. 437
Appendix M
Log Descriptions.................................................................................................. 439
Log Commands...................................................................................................... 448
Configuring What You Want the Prestige to Log ............................................. 448
Displaying Logs ............................................................................................... 449
Log Command Example......................................................................................... 450
Index...................................................................................................................... 451