ZyXEL Communications NXC-8160 User Manual page 20

Business wlan controller
Hide thumbs Also See for NXC-8160:
Table of Contents

Advertisement

List of Tables
Table 40 Events & Logs > Severity Indicators ....................................................................................... 96
Table 41 Events & Logs > Severity Indicators ....................................................................................... 96
Table 42 Events & Logs > Events Log History ....................................................................................... 98
Table 43 Events & Logs > Events Log History ....................................................................................... 99
Table 44 Hardware Specifications ....................................................................................................... 107
Table 45 Firmware Specifications ........................................................................................................ 107
Table 46 Console Port Pin Assignments ............................................................................................. 108
Table 47 Ethernet Cable Pin Assignments .......................................................................................... 108
Table 48 IP Address Network Number and Host ID Example ............................................................. 162
Table 49 Subnet Masks ....................................................................................................................... 163
Table 50 Maximum Host Numbers ...................................................................................................... 163
Table 51 Alternative Subnet Mask Notation ......................................................................................... 163
Table 52 Subnet 1 ................................................................................................................................ 165
Table 53 Subnet 2 ................................................................................................................................ 166
Table 54 Subnet 3 ................................................................................................................................ 166
Table 55 Subnet 4 ................................................................................................................................ 166
Table 56 Eight Subnets ........................................................................................................................ 166
Table 57 24-bit Network Number Subnet Planning .............................................................................. 167
Table 58 16-bit Network Number Subnet Planning .............................................................................. 167
Table 59 IEEE 802.11g ........................................................................................................................ 183
Table 60 Wireless Security Levels ....................................................................................................... 184
Table 61 Comparison of EAP Authentication Types ............................................................................ 187
Table 62 Wireless Security Relational Matrix ...................................................................................... 190
20
[Document Title]

Advertisement

Table of Contents
loading

Table of Contents