ZyXEL Communications ZyXEL G-560 User Manual

Page of 144
ZyXEL G-560 User’s Guide
 List of Tables
19
List of Tables
Table 1 Front Panel LED Description   ................................................................................. 28
Table 2 Factory Defaults   .................................................................................................... 35
Table 3 Status  ..................................................................................................................... 46
Table 4 Status: View Statistics  ............................................................................................ 47
Table 5 Status: View Association List  ................................................................................. 48
Table 6 Private IP Address Ranges   ................................................................................... 49
Table 7 System Settings  ..................................................................................................... 51
Table 8 Time Settings  ......................................................................................................... 52
Table 9 WMM QoS Priorities   .............................................................................................. 57
Table 10 Wireless Settings: Access Point   .......................................................................... 59
Table 11 Wireless Settings: Access Point + Bridge  ............................................................ 64
Table 12 Wireless Security Levels   ..................................................................................... 66
Table 13 Wireless Security Relational Matrix   ..................................................................... 73
Table 14 Wireless Security: Disable  ................................................................................... 75
Table 15 Wireless Security: WEP  ....................................................................................... 75
Table 16 Wireless Security: WPA-PSK   .............................................................................. 77
Table 17 Wireless Security: WPA  ....................................................................................... 78
Table 18 Wireless Security: 802.1x   .................................................................................... 79
Table 19 MAC Filter  ............................................................................................................ 81
Table 20 OTIST   .................................................................................................................. 82
Table 21 Management: Password  ...................................................................................... 85
Table 22 Management: Logs  .............................................................................................. 86
Table 23 Management: Configuration File: Restore Configuration   .................................... 88
Table 24 Management: F/W Upload  ................................................................................... 90
Table 25 Troubleshooting the Start-Up of Your G-560   ....................................................... 93
Table 26 Troubleshooting the Password   ............................................................................ 93
Table 27 Troubleshooting the WLAN Interface  ................................................................... 94
Table 28 Troubleshooting the Ethernet Interface   ............................................................... 94
Table 29 IEEE802.11g  ........................................................................................................ 123
Table 30 Comparison of EAP Authentication Types  ........................................................... 128
Table 31 Classes of IP Addresses   ..................................................................................... 133
Table 32 Allowed IP Address Range By Class  ................................................................... 134
Table 33  “Natural” Masks   .................................................................................................. 134
Table 34 Alternative Subnet Mask Notation   ....................................................................... 135
Table 35 Two Subnets Example  ......................................................................................... 135
Table 36 Subnet 1   .............................................................................................................. 136
Table 37 Subnet 2   .............................................................................................................. 136
Table 38 Subnet 1   .............................................................................................................. 137