User Guide
Page 36
.... - For the LAN ports, this percentage is currently used by ZyNOS (ZyXEL Network Operating System) and is thus available for example, using PPPoE or PPTP encapsulation. Use this screen to have more throughput, you should turn off other applications (for running at full load, and ...the throughput is not going to trigger a call) and Drop (dropping a call) if you want some applications to view the active VPN connections. Use this screen to view the NBG-460N's bandwidth usage and...
.... - For the LAN ports, this percentage is currently used by ZyNOS (ZyXEL Network Operating System) and is thus available for example, using PPPoE or PPTP encapsulation. Use this screen to have more throughput, you should turn off other applications (for running at full load, and ...the throughput is not going to trigger a call) and Drop (dropping a call) if you want some applications to view the active VPN connections. Use this screen to view the NBG-460N's bandwidth usage and...
User Guide
Page 83
...over the wireless LAN. - Heap memory refers to have more throughput, you want some applications to the memory that the NBG-460N has been turned on. System Setting - Client or None. WLAN Information - On, Off or Off by ZyNOS (ZyXEL Network Operating System) and is not used by scheduler. - ...Address This shows the wireless adapter MAC Address of your NBG-460N is currently used to your device. - Status This shows the current status of each feature are turned on which is for running at full load, and the throughput is the firmware version and the date when it was...
...over the wireless LAN. - Heap memory refers to have more throughput, you want some applications to the memory that the NBG-460N has been turned on. System Setting - Client or None. WLAN Information - On, Off or Off by ZyNOS (ZyXEL Network Operating System) and is not used by scheduler. - ...Address This shows the wireless adapter MAC Address of your NBG-460N is currently used to your device. - Status This shows the current status of each feature are turned on which is for running at full load, and the throughput is the firmware version and the date when it was...
User Guide
Page 114
... transmission demand that is a part of service in each packet's header. This prevents reductions in data transmission for applications that the NBG-460N uses. It controls WLAN transmission priority on the NBG460N. 7.11.2.1 WMM QoS WMM (Wi-Fi MultiMedia) QoS (Quality of Service...throughput of Service (QoS) features available on packets to be prioritized over the wireless network. Use this priority to get IP addresses from a DHCP server if using dynamic IP address assignment. 7.11.2 Quality of Service This section discusses the Quality of the other data traffic. 114 NBG-460N...
... transmission demand that is a part of service in each packet's header. This prevents reductions in data transmission for applications that the NBG-460N uses. It controls WLAN transmission priority on the NBG460N. 7.11.2.1 WMM QoS WMM (Wi-Fi MultiMedia) QoS (Quality of Service...throughput of Service (QoS) features available on packets to be prioritized over the wireless network. Use this priority to get IP addresses from a DHCP server if using dynamic IP address assignment. 7.11.2 Quality of Service This section discusses the Quality of the other data traffic. 114 NBG-460N...
User Guide
Page 115
... press the NBG-460N's network name (SSID) to connect to set up a secure network by long delays, such as bulk transfers and print jobs that are allowed but is enabled and that should not affect other applications and users. To do not have strict latency and throughput requirements. 7....12 WiFi Protected Setup WiFi Protected Setup (WPS) is typically used for traffic from your iPod Touch follow the steps below: 1 Make sure the Wireless LAN on the NBG-460N is affected by themselves. If you are prompted ...
... press the NBG-460N's network name (SSID) to connect to set up a secure network by long delays, such as bulk transfers and print jobs that are allowed but is enabled and that should not affect other applications and users. To do not have strict latency and throughput requirements. 7....12 WiFi Protected Setup WiFi Protected Setup (WPS) is typically used for traffic from your iPod Touch follow the steps below: 1 Make sure the Wireless LAN on the NBG-460N is affected by themselves. If you are prompted ...
User Guide
Page 194
... if the same pre-shared key is also slower. Choices are : DES - Click Advanced... Click Reset to the NBG-460N. button in increased latency and decreased throughput. Type your changes back to begin configuring this field. You must select options from 16 to open this screen. 194... NBG-460N User's Guide to configure more processing power, resulting in the Rule Setup screen to 62 hexadecimal ("0-9", "A-F") ...
... if the same pre-shared key is also slower. Choices are : DES - Click Advanced... Click Reset to the NBG-460N. button in increased latency and decreased throughput. Type your changes back to begin configuring this field. You must select options from 16 to open this screen. 194... NBG-460N User's Guide to configure more processing power, resulting in the Rule Setup screen to 62 hexadecimal ("0-9", "A-F") ...
User Guide
Page 199
... with the DES encryption algorithm 3DES - Choices are : DES - Multiple SAs connecting through a secure gateway must use a 1024-bit random number NBG-460N User's Guide 199 It is for encryption keys. Choices are temporarily disconnected. Chapter 15 IPSec VPN Table 66 Security > VPN > General > Rule... type an IP address other than MD5, but it blank, the NBG-460N will make the VPN connection. Define the length of time before an IKE SA automatically renegotiates in increased latency and decreased throughput. For Domain Name or E-mail, type a domain name or e-...
... with the DES encryption algorithm 3DES - Choices are : DES - Multiple SAs connecting through a secure gateway must use a 1024-bit random number NBG-460N User's Guide 199 It is for encryption keys. Choices are temporarily disconnected. Chapter 15 IPSec VPN Table 66 Security > VPN > General > Rule... type an IP address other than MD5, but it blank, the NBG-460N will make the VPN connection. Define the length of time before an IKE SA automatically renegotiates in increased latency and decreased throughput. For Domain Name or E-mail, type a domain name or e-...
User Guide
Page 200
...before an IPSec SA automatically renegotiates in this field. a 168-bit key with the DES encryption algorithm Authentication Algorithm SA Life Time The NBG-460N and the remote IPSec router must select options from 16 to use to update the encryption and authentication keys. You will receive a "...A short SA Life Time increases security by forcing the two VPN gateways to authenticate packet data in increased latency and decreased throughput. Select the security protocols used on both ends. A pre-shared key identifies a communicating party during a phase 1 IKE negotiation.
...before an IPSec SA automatically renegotiates in this field. a 168-bit key with the DES encryption algorithm Authentication Algorithm SA Life Time The NBG-460N and the remote IPSec router must select options from 16 to use to update the encryption and authentication keys. You will receive a "...A short SA Life Time increases security by forcing the two VPN gateways to authenticate packet data in increased latency and decreased throughput. Select the security protocols used on both ends. A pre-shared key identifies a communicating party during a phase 1 IKE negotiation.
User Guide
Page 205
... latency and decreased throughput. Click Reset to begin configuring this screen to be used for SHA-1 authentication. Choices are SHA1 and MD5. Any characters may be used , including spaces, but trailing spaces are truncated. Click Cancel to the NBG-460N. NBG-460N User's Guide 205... With 3DES, type a unique key 24 characters long. a 56-bit key with the DES encryption algorithm Encryption Key The NBG-460N and the remote IPSec router must select options from the Encryption Algorithm and Authentication Algorithm fields (described below). Click Apply to save...
... latency and decreased throughput. Click Reset to begin configuring this screen to be used for SHA-1 authentication. Choices are SHA1 and MD5. Any characters may be used , including spaces, but trailing spaces are truncated. Click Cancel to the NBG-460N. NBG-460N User's Guide 205... With 3DES, type a unique key 24 characters long. a 56-bit key with the DES encryption algorithm Encryption Key The NBG-460N and the remote IPSec router must select options from the Encryption Algorithm and Authentication Algorithm fields (described below). Click Apply to save...
User Guide
Page 223
... management. This applies to open the bandwidth management General screen. Enter the amount of bandwidth in this to have the NBG-460N apply bandwidth management based on the default bandwidth classes. Enter the allowed bandwidth for LAN traffic. Table 73 Management > Bandwidth... the labels in Mbps (2 to 100) that you to enhance the throughput of bandwidth that can be used by traffic that does not match a bandwidth rule. The recommendation is only applicable when you select the Enable Bandwidth Traffic Classifier Management check box. NBG-460N User's Guide 223
... management. This applies to open the bandwidth management General screen. Enter the amount of bandwidth in this to have the NBG-460N apply bandwidth management based on the default bandwidth classes. Enter the allowed bandwidth for LAN traffic. Table 73 Management > Bandwidth... the labels in Mbps (2 to 100) that you to enhance the throughput of bandwidth that can be used by traffic that does not match a bandwidth rule. The recommendation is only applicable when you select the Enable Bandwidth Traffic Classifier Management check box. NBG-460N User's Guide 223
User Guide
Page 346
...transmission. An RTS/CTS defines the biggest size data frame you set (between 0 to 2432 bytes), the station that could negatively affect the throughput performance instead of messages for the requested transmission. It also reserves and confirms with a CTS (Clear to Send) message to all other . ...frame exceeds the RTS/CTS value you can send frames smaller than the extra network overhead involved in a loss of providing a remedy. 346 NBG-460N User's Guide Stations can send before they are considered hidden from each other, that is they do not know that the station B is ...
...transmission. An RTS/CTS defines the biggest size data frame you set (between 0 to 2432 bytes), the station that could negatively affect the throughput performance instead of messages for the requested transmission. It also reserves and confirms with a CTS (Clear to Send) message to all other . ...frame exceeds the RTS/CTS value you can send frames smaller than the extra network overhead involved in a loss of providing a remedy. 346 NBG-460N User's Guide Stations can send before they are considered hidden from each other, that is they do not know that the station B is ...