ZyXEL Communications 660H Series Network Router User Manual


 
Prestige 660H/HW Series User’s Guide
21
WEP Authentication Steps ..................................................................................... 400
Dynamic WEP Key Exchange ......................................................................... 401
WPA ....................................................................................................................... 402
User Authentication ........................................................................................ 402
Encryption ....................................................................................................... 402
Security Parameters Summary .............................................................................. 403
Roaming................................................................................................................. 403
Requirements for Roaming.............................................................................. 404
Appendix G
Antenna Selection and Positioning Recommendation..................................... 406
Antenna Characteristics ......................................................................................... 406
Frequency........................................................................................................ 406
Radiation Pattern............................................................................................. 406
Antenna Gain................................................................................................... 406
Types of Antennas For WLAN................................................................................ 407
Positioning Antennas....................................................................................... 407
Connector Type...................................................................................................... 407
Appendix H
Example Internal SPTGEN Screens.................................................................... 408
Command Examples.............................................................................................. 428
Appendix I
Command Interpreter........................................................................................... 430
Command Syntax................................................................................................... 430
Command Usage ................................................................................................... 430
Appendix J
Firewall Commands ............................................................................................. 432
Sys Firewall Commands ........................................................................................ 432
Appendix K
Brute-Force Password Guessing Protection..................................................... 434
Example ................................................................................................................. 434
Appendix L
Boot Commands .................................................................................................. 436
Appendix M
Log Descriptions.................................................................................................. 438
Log Commands...................................................................................................... 447