ZyXEL Communications P-661H Series User Manual
List of Tables
P-661H/HW Series User’s Guide
30
Table 125 Subnet 2 .............................................................................................................................. 318
Table 126 Subnet 3 .............................................................................................................................. 318
Table 127 Subnet 4 .............................................................................................................................. 318
Table 128 Eight Subnets ...................................................................................................................... 318
Table 129 24-bit Network Number Subnet Planning ............................................................................ 319
Table 130 16-bit Network Number Subnet Planning ............................................................................ 319
Table 131 IEEE 802.11g ...................................................................................................................... 327
Table 132 Wireless Security Levels ..................................................................................................... 328
Table 133 Comparison of EAP Authentication Types .......................................................................... 331
Table 134 Wireless Security Relational Matrix .................................................................................... 334
Table 135 Commonly Used Services ................................................................................................... 337
Table 126 Subnet 3 .............................................................................................................................. 318
Table 127 Subnet 4 .............................................................................................................................. 318
Table 128 Eight Subnets ...................................................................................................................... 318
Table 129 24-bit Network Number Subnet Planning ............................................................................ 319
Table 130 16-bit Network Number Subnet Planning ............................................................................ 319
Table 131 IEEE 802.11g ...................................................................................................................... 327
Table 132 Wireless Security Levels ..................................................................................................... 328
Table 133 Comparison of EAP Authentication Types .......................................................................... 331
Table 134 Wireless Security Relational Matrix .................................................................................... 334
Table 135 Commonly Used Services ................................................................................................... 337