
Prestige 2602H/HW Series User’s Guide
Table of Contents 27
LEAP................................................................................................................ 486
Dynamic WEP Key Exchange ......................................................................... 486
WPA ....................................................................................................................... 487
User Authentication ........................................................................................ 487
Encryption ....................................................................................................... 487
Security Parameters Summary .............................................................................. 488
Appendix F
Triangle Route ...................................................................................................... 489
The Ideal Setup...................................................................................................... 489
The “Triangle Route” Problem................................................................................ 489
The “Triangle Route” Solutions .............................................................................. 490
IP Aliasing .............................................................................................................. 490
Gateways on the WAN Side................................................................................... 491
Appendix G
Internal SPTGEN .................................................................................................. 493
Internal SPTGEN Overview ................................................................................... 493
The Configuration Text File Format........................................................................ 493
Internal SPTGEN File Modification - Important Points to Remember .............. 493
Internal SPTGEN FTP Download Example............................................................ 494
Internal SPTGEN FTP Upload Example ................................................................ 495
Command Examples.............................................................................................. 516
Appendix H
Command Interpreter........................................................................................... 519
Command Syntax................................................................................................... 519
Command Usage ................................................................................................... 519
Appendix I
Firewall Commands ............................................................................................. 521
Sys Firewall Commands ........................................................................................ 521
Appendix J
Boot Commands .................................................................................................. 523
Appendix K
Log Descriptions.................................................................................................. 525
Log Commands...................................................................................................... 534
Configuring What You Want the Prestige to Log ............................................. 534
Displaying Logs ............................................................................................... 535
Log Command Example......................................................................................... 536
Comentários a estes Manuais