ZyXEL Communications P-334WH User Manual page 25

802.11g high power wireless router
Hide thumbs Also See for P-334WH:
Table of Contents

Advertisement

P-334WH User's Guide
Table 80 Troubleshooting Starting Up Your ZyXEL Device ................................................ 193
Table 81 Troubleshooting the LAN ..................................................................................... 193
Table 82 Troubleshooting the WAN .................................................................................... 194
Table 83 Troubleshooting Accessing the ZyXEL Device .................................................... 195
Table 85 Troubleshooting the Password ............................................................................ 196
Table 86 Troubleshooting Telnet ........................................................................................ 196
Table 87 Hardware Features .............................................................................................. 207
Table 88 Firmware Features .............................................................................................. 207
Table 89 Classes of IP Addresses ..................................................................................... 228
Table 90 Allowed IP Address Range By Class ................................................................... 228
Table 91 "Natural" Masks .................................................................................................. 229
Table 92 Alternative Subnet Mask Notation ....................................................................... 229
Table 93 Two Subnets Example ......................................................................................... 230
Table 94 Subnet 1 .............................................................................................................. 230
Table 95 Subnet 2 .............................................................................................................. 231
Table 96 Subnet 1 .............................................................................................................. 231
Table 97 Subnet 2 .............................................................................................................. 232
Table 98 Subnet 3 .............................................................................................................. 232
Table 99 Subnet 4 .............................................................................................................. 232
Table 100 Eight Subnets .................................................................................................... 233
Table 101 Class C Subnet Planning ................................................................................... 233
Table 102 Class B Subnet Planning ................................................................................... 234
Table 103 IEEE 802.11g ..................................................................................................... 239
Table 104 Wireless Security Levels ................................................................................... 240
Table 105 Comparison of EAP Authentication Types ......................................................... 243
Table 106 Wireless Security Relational Matrix ................................................................... 247
Table 107 System Maintenance Logs ................................................................................ 251
Table 108 System Error Logs ............................................................................................. 252
Table 109 Access Control Logs .......................................................................................... 252
Table 110 TCP Reset Logs ................................................................................................ 253
Table 111 Packet Filter Logs .............................................................................................. 253
Table 112 ICMP Logs ......................................................................................................... 254
Table 113 CDR Logs .......................................................................................................... 254
Table 114 PPP Logs ........................................................................................................... 254
Table 115 UPnP Logs ......................................................................................................... 255
Table 116 Content Filtering Logs ........................................................................................ 255
Table 117 Attack Logs ........................................................................................................ 256
Table 118 PKI Logs ............................................................................................................ 257
Table 119 802.1X Logs ....................................................................................................... 258
Table 120 ACL Setting Notes ............................................................................................. 258
Table 121 ICMP Notes ....................................................................................................... 259
Table 122 Syslog Logs ....................................................................................................... 260
25

Advertisement

Table of Contents
loading

Table of Contents