ZyXEL g-2000 plusv2 Guia Do Utilizador
![ZyXEL](https://files.manualsbrain.com/attachments/3214a2e9b754be0b3a733d7fd22528bce8dfdece/common/fit/150/50/aafad0ddc2d0e29fd47cd3dd2d9b75f1e404d4f49531d3941fba34789d6b/brand_logo.jpeg)
ZyXEL G-2000 Plus v2 User’s Guide
22
Table of Contents
IP Addressing......................................................................................................... 385
IP Classes .............................................................................................................. 385
Subnet Masks ........................................................................................................ 386
Subnetting .............................................................................................................. 386
Example: Two Subnets .......................................................................................... 387
Example: Four Subnets.......................................................................................... 389
Example Eight Subnets.......................................................................................... 390
Subnetting With Class A and Class B Networks. ................................................... 391
IP Classes .............................................................................................................. 385
Subnet Masks ........................................................................................................ 386
Subnetting .............................................................................................................. 386
Example: Two Subnets .......................................................................................... 387
Example: Four Subnets.......................................................................................... 389
Example Eight Subnets.......................................................................................... 390
Subnetting With Class A and Class B Networks. ................................................... 391
Log Commands...................................................................................................... 396
Log Command Example......................................................................................... 398
Log Command Example......................................................................................... 398
Benefits of a Wireless LAN .................................................................................... 399
Wireless LAN Basics.............................................................................................. 402
Fragmentation Threshold ....................................................................................... 403
IEEE 802.11 ........................................................................................................... 404
Wireless LAN Basics.............................................................................................. 402
Fragmentation Threshold ....................................................................................... 403
IEEE 802.11 ........................................................................................................... 404
IEEE 802.11g Wireless LAN .................................................................................. 405
IEEE 802.1x ........................................................................................................... 405
RADIUS.................................................................................................................. 406
Types of Authentication.......................................................................................... 407
WEP Authentication ............................................................................................... 408
IEEE 802.1x ........................................................................................................... 405
RADIUS.................................................................................................................. 406
Types of Authentication.......................................................................................... 407
WEP Authentication ............................................................................................... 408