List of tables – ZyXEL Communications G-2000 Plus User Manual
Page 29

ZyAIR G-2000 Plus User’s Guide
List of Tables
28
List of Tables
Table 1 IEEE 802.11b ......................................................................................................... 37
Table 2 IEEE 802.11g ......................................................................................................... 38
Table 3 Wizard 1 : General Setup ...................................................................................... 50
Table 4 Wizard 2 : Wireless LAN Setup ............................................................................. 51
Table 5 Wizard 3: Wireless LAN Setup: Basic Security ..................................................... 52
Table 6 Wizard 3: Wireless LAN Setup: Extend Security ................................................... 53
Table 7 Wizard 4: Ethernet Encapsulation ......................................................................... 54
Table 8 Wizard 4: PPPoE Encapsulation ........................................................................... 56
Table 9 Wizard 4: PPTP Encapsulation ............................................................................. 57
Table 10 Private IP Address Ranges ................................................................................. 58
Table 11 Example of Network Properties for LAN Servers with Fixed IP Addresses ......... 60
Table 12 Wizard 5: WAN Setup .......................................................................................... 61
Table 13 System General Setup ........................................................................................ 64
Table 14 DDNS .................................................................................................................. 66
Table 15 Password ............................................................................................................. 67
Table 16 Time Setting ........................................................................................................ 68
Table 17 LAN IP ................................................................................................................. 73
Table 18 Static DHCP ......................................................................................................... 76
Table 19 IP Alias ................................................................................................................ 77
Table 20 Wireless ............................................................................................................... 83
Table 21 Roaming .............................................................................................................. 86
Table 22 Wireless No Security ........................................................................................... 89
Table 23 Wireless Security Relational Matrix ..................................................................... 90
Table 24 Wireless: Static WEP Encryption ......................................................................... 92
Table 25 Wireless: WPA-PSK ............................................................................................ 96
Table 26 Wireless: WPA ..................................................................................................... 99
Table 27 RADIUS ............................................................................................................... 103
Table 28 Wireless: 802.1x and Dynamic WEP ................................................................... 106
Table 29 Wireless: 802.1x and Static WEP ........................................................................ 108
Table 30 Wireless: 802.1x and No WEP ............................................................................ 111
Table 31 MAC Address Filter ............................................................................................. 113
Table 32 Internal RADIUS Server ...................................................................................... 115
Table 33 My Certificates ..................................................................................................... 117
Table 34 Trusted AP ........................................................................................................... 119
Table 35 Trusted Users ...................................................................................................... 121
Table 36 Ethernet Encapsulation ....................................................................................... 125