ZyXEL Communications P-334WT User Manual page 35

802.11g wireless broadband router with firewall
Hide thumbs Also See for P-334WT:
Table of Contents

Advertisement

P-334WT User's Guide
Table 167 Troubleshooting the Password .......................................................................... 392
Table 168 Troubleshooting Telnet ...................................................................................... 392
Table 169 Classes of IP Addresses ................................................................................... 419
Table 170 Allowed IP Address Range By Class ................................................................. 420
Table 171 "Natural" Masks ................................................................................................ 420
Table 172 Alternative Subnet Mask Notation ..................................................................... 421
Table 173 Two Subnets Example ....................................................................................... 421
Table 174 Subnet 1 ............................................................................................................ 422
Table 175 Subnet 2 ............................................................................................................ 422
Table 176 Subnet 1 ............................................................................................................ 423
Table 177 Subnet 2 ............................................................................................................ 423
Table 178 Subnet 3 ............................................................................................................ 423
Table 179 Subnet 4 ............................................................................................................ 424
Table 180 Eight Subnets .................................................................................................... 424
Table 181 Class C Subnet Planning ................................................................................... 424
Table 182 Class B Subnet Planning ................................................................................... 425
Table 183 IEEE 802.11g ..................................................................................................... 437
Table 184 Comparison of EAP Authentication Types ......................................................... 441
Table 185 Wireless Security Relational Matrix ................................................................... 442
Table 186 System Maintenance Logs ................................................................................ 443
Table 187 System Error Logs ............................................................................................. 444
Table 188 Access Control Logs .......................................................................................... 444
Table 189 TCP Reset Logs ................................................................................................ 445
Table 190 Packet Filter Logs .............................................................................................. 445
Table 191 ICMP Logs ......................................................................................................... 446
Table 192 CDR Logs .......................................................................................................... 446
Table 193 PPP Logs ........................................................................................................... 446
Table 194 UPnP Logs ........................................................................................................ 447
Table 195 Content Filtering Logs ....................................................................................... 447
Table 196 Attack Logs ........................................................................................................ 448
Table 197 IPSec Logs ........................................................................................................ 449
Table 198 IKE Logs ............................................................................................................ 449
Table 199 PKI Logs ............................................................................................................ 452
Table 200 Certificate Path Verification Failure Reason Codes ........................................... 453
Table 201 802.1X Logs ...................................................................................................... 454
Table 202 ACL Setting Notes ............................................................................................. 455
Table 203 ICMP Notes ....................................................................................................... 455
Table 204 Syslog Logs ....................................................................................................... 456
Table 205 RFC-2408 ISAKMP Payload Types ................................................................... 456
List of Tables
35

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents