ZyXEL Communications Network Device P-2602 User Manual page 32

802.11g wireless adsl2+ voip iad/adsl2+ voip iad
Table of Contents

Advertisement

P-2602H(W)(L)-DxA Series User's Guide
Table 125 Troubleshooting Starting Up Your Device .......................................................... 319
Table 126 Troubleshooting the LAN ................................................................................... 319
Table 127 Troubleshooting the WAN .................................................................................. 320
Table 128 Troubleshooting Accessing Your Device ........................................................... 321
Table 129 Troubleshooting Telephone ............................................................................... 329
Table 130 Device Specifications ......................................................................................... 333
Table 131 Firmware Specifications ..................................................................................... 334
Table 132 P-2602HWL Series Power Adaptor Specifications ............................................ 336
Table 133 Classes of IP Addresses ................................................................................... 354
Table 134 Allowed IP Address Range By Class ................................................................. 354
Table 135 "Natural" Masks ................................................................................................ 355
Table 136 Alternative Subnet Mask Notation ..................................................................... 355
Table 137 Two Subnets Example ....................................................................................... 356
Table 138 Subnet 1 ............................................................................................................ 356
Table 139 Subnet 2 ............................................................................................................ 357
Table 140 Subnet 1 ............................................................................................................ 357
Table 141 Subnet 2 ............................................................................................................ 358
Table 142 Subnet 3 ............................................................................................................ 358
Table 143 Subnet 4 ............................................................................................................ 358
Table 144 Eight Subnets .................................................................................................... 359
Table 145 Class C Subnet Planning ................................................................................... 359
Table 146 Class B Subnet Planning ................................................................................... 360
Table 147 IEEE 802.11g ..................................................................................................... 365
Table 148 Comparison of EAP Authentication Types ......................................................... 369
Table 149 Wireless Security Relational Matrix ................................................................... 370
Table 150 Examples of Services ........................................................................................ 371
Table 151 Sys Firewall Commands .................................................................................... 375
Table 152 System Maintenance Logs ................................................................................ 381
Table 153 System Error Logs ............................................................................................. 382
Table 154 Access Control Logs .......................................................................................... 382
Table 155 TCP Reset Logs ................................................................................................ 383
Table 156 Packet Filter Logs .............................................................................................. 383
Table 157 ICMP Logs ......................................................................................................... 383
Table 158 CDR Logs .......................................................................................................... 384
Table 159 PPP Logs ........................................................................................................... 384
Table 160 UPnP Logs ........................................................................................................ 385
Table 161 Content Filtering Logs ....................................................................................... 385
Table 162 Attack Logs ........................................................................................................ 385
Table 163 802.1X Logs ...................................................................................................... 386
Table 164 ACL Setting Notes ............................................................................................. 387
Table 165 ICMP Notes ....................................................................................................... 387
Table 166 Syslog Logs ....................................................................................................... 388
Table 167 SIP Logs ............................................................................................................ 388
32
List of Tables

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents