ZyXEL 336M 91-003-192001B Benutzerhandbuch

Produktcode
91-003-192001B
Seite von 103
ZyXEL P-336M User’s Guide
List of Tables
14
List of Tables
Table 1 Front Panel LEDs   ..................................................................................... 19
Table 2 Web Configurator Screen Sub-Menus  ...................................................... 21
Table 3 Web Configurator Screen Icons   ............................................................... 22
Table 4 Change Password   .................................................................................... 23
Table 5 Private IP Address Ranges   ...................................................................... 25
Table 6 Basic: WAN: Dynamic IP   .......................................................................... 26
Table 7 Basic: WAN: Static IP   ............................................................................... 28
Table 8 Basic: WAN: PPPoE   ................................................................................. 29
Table 9 Basic: LAN  ................................................................................................ 30
Table 10 Basic: DHCP  ........................................................................................... 32
Table 11 Basic: Wireless: Basic WIreless LAN Setup   ........................................... 34
Table 12 Basic: Wireless: WLAN Security Setup: WEP   ........................................ 38
Table 13 Basic: WLAN Security Setup: WPA-Personal  ......................................... 39
Table 14 Basic: WLAN Security Setup: WPA-Enterprise  ....................................... 40
Table 15 Advanced: Game Hosting  ....................................................................... 43
Table 16 Virtual Server: Common Services and Port Numbers   ............................ 44
Table 17 Advanced: Virtual Server  ........................................................................ 45
Table 18 Advanced: Applications   .......................................................................... 47
Table 19 Advanced: StreamEngine   ....................................................................... 50
Table 20 Advanced: Routing   ................................................................................. 53
Table 21 Advanced: Access Control   ..................................................................... 54
Table 22 Advanced: Web Filter   ............................................................................. 56
Table 23 Advanced: MAC Filter  ............................................................................. 57
Table 24 Advanced: Firewall   ................................................................................. 59
Table 25 Advanced: Inbound Filter  ........................................................................ 60
Table 26 Advanced: Wireless  ................................................................................ 63
Table 27 Advanced: Schedule  ............................................................................... 64
Table 28 Tools: Admin   ........................................................................................... 67
Table 29 Tools: Time   ............................................................................................. 71
Table 30 Tools: Syslog   .......................................................................................... 73
Table 31 Tools: E-mail   ........................................................................................... 74
Table 32 Tools: DDNS   ........................................................................................... 77
Table 33 Tools: Admin   ........................................................................................... 81
Table 34 Association List  ....................................................................................... 82
Table 35 Status: Logs  ............................................................................................ 83
Table 36 Status: Statistics   ..................................................................................... 84
Table 37 Comparison of EAP Authentication Types  .............................................. 87
Table 38 Wireless Security Relational Matrix   ........................................................ 89