List of tables – ZyXEL Communications 802.11g Wireless Access Point ZyXEL G-560 User Manual
Page 19
ZyXEL G-560 User’s Guide
List of Tables
19
List of Tables
Table 1 Front Panel LED Description ................................................................................. 28
Table 2 Factory Defaults .................................................................................................... 35
Table 3 Status ..................................................................................................................... 46
Table 4 Status: View Statistics ............................................................................................ 47
Table 5 Status: View Association List ................................................................................. 48
Table 6 Private IP Address Ranges ................................................................................... 49
Table 7 System Settings ..................................................................................................... 51
Table 8 Time Settings ......................................................................................................... 52
Table 9 WMM QoS Priorities .............................................................................................. 57
Table 10 Wireless Settings: Access Point .......................................................................... 59
Table 11 Wireless Settings: Access Point + Bridge ............................................................ 64
Table 12 Wireless Security Levels ..................................................................................... 66
Table 13 Wireless Security Relational Matrix ..................................................................... 73
Table 14 Wireless Security: Disable ................................................................................... 75
Table 15 Wireless Security: WEP ....................................................................................... 75
Table 16 Wireless Security: WPA-PSK .............................................................................. 77
Table 17 Wireless Security: WPA ....................................................................................... 78
Table 18 Wireless Security: 802.1x .................................................................................... 79
Table 19 MAC Filter ............................................................................................................ 81
Table 20 OTIST .................................................................................................................. 82
Table 21 Management: Password ...................................................................................... 85
Table 22 Management: Logs .............................................................................................. 86
Table 23 Management: Configuration File: Restore Configuration .................................... 88
Table 24 Management: F/W Upload ................................................................................... 90
Table 25 Troubleshooting the Start-Up of Your G-560 ....................................................... 93
Table 26 Troubleshooting the Password ............................................................................ 93
Table 27 Troubleshooting the WLAN Interface ................................................................... 94
Table 28 Troubleshooting the Ethernet Interface ............................................................... 94
Table 29 IEEE802.11g ........................................................................................................ 123
Table 30 Comparison of EAP Authentication Types ........................................................... 128
Table 31 Classes of IP Addresses ..................................................................................... 133
Table 32 Allowed IP Address Range By Class ................................................................... 134
Table 33 “Natural” Masks .................................................................................................. 134
Table 34 Alternative Subnet Mask Notation ....................................................................... 135
Table 35 Two Subnets Example ......................................................................................... 135
Table 36 Subnet 1 .............................................................................................................. 136
Table 37 Subnet 2 .............................................................................................................. 136
Table 38 Subnet 1 .............................................................................................................. 137