NetScreen-5GT Wireless
1
Preface........................................................................................ 3
Connecting the NetScreen Device to Your Networks ................................. 7
Connecting the Device to an Untrusted Network ............................................ 7
Connecting the ADSL Port ...........................................................................7
Connecting the Untrusted Port ....................................................................9
Connecting the Device to Your Internal Network or Workstations.................... 9
Rack Mounting (Optional) ........................................................................ 10
Using the WebUI............................................................................................. 13
Using Telnet ................................................................................................... 14
Using a Console Connection......................................................................... 15
Configuring the ADSL Interface ..................................................................... 20
Adding Virtual Circuits to an ADSL Interface .................................................. 20
VPI/VCI and Multiplexing Method .................................................................. 21
PPPoE or PPPoA .............................................................................................. 22
Annex B Mode ............................................................................................... 22
Static IP Address and Netmask ...................................................................... 23
Restricting Management............................................................................... 25
Configuring Additional Policies...................................................................... 25
Operational Mode ........................................................................................ 25
Changing the Port Mode............................................................................... 26
Configuring a Backup Untrust Zone Interface................................................ 28