ZyXEL Communications P-335U Personal Computer User Manual


 
P-334U/P-335U User’s Guide
27
Table 80 Maintenance Firmware Upload ............................................................................ 223
Table 81 Maintenance Restore Configuration .................................................................... 225
Table 82 Config Mode: Advanced Screens ........................................................................ 229
Table 83 Troubleshooting Starting Up Your ZyXEL Device ................................................ 231
Table 84 Troubleshooting the LAN ..................................................................................... 231
Table 85 Troubleshooting the WAN .................................................................................... 232
Table 86 Troubleshooting Accessing the ZyXEL Device .................................................... 233
Table 87 Troubleshooting Restricted Web Pages and Keyword Blocking .......................... 233
Table 88 Troubleshooting the Password ............................................................................ 234
Table 89 Troubleshooting Telnet ........................................................................................ 234
Table 90 Troubleshooting the Print Server ......................................................................... 235
Table 91 Hardware Specifications ...................................................................................... 245
Table 92 Firmware Specifications ....................................................................................... 245
Table 93 Print Server Interface ........................................................................................... 249
Table 94 Print Server Requirements and Specifications .................................................... 249
Table 95 Compatible USB Printers ..................................................................................... 250
Table 96 Classes of IP Addresses ..................................................................................... 271
Table 97 Allowed IP Address Range By Class ................................................................... 272
Table 98 “Natural” Masks .................................................................................................. 272
Table 99 Alternative Subnet Mask Notation ....................................................................... 273
Table 100 Two Subnets Example ....................................................................................... 273
Table 101 Subnet 1 ............................................................................................................274
Table 102 Subnet 2 ............................................................................................................274
Table 103 Subnet 1 ............................................................................................................275
Table 104 Subnet 2 ............................................................................................................275
Table 105 Subnet 3 ............................................................................................................275
Table 106 Subnet 4 ............................................................................................................276
Table 107 Eight Subnets .................................................................................................... 276
Table 108 Class C Subnet Planning ................................................................................... 276
Table 109 Class B Subnet Planning ................................................................................... 277
Table 110 IEEE 802.11g ..................................................................................................... 283
Table 111 Wireless Security Levels .................................................................................... 284
Table 112 Comparison of EAP Authentication Types ......................................................... 287
Table 113 Wireless Security Relational Matrix ................................................................... 291
Table 114 System Maintenance Logs ................................................................................ 293
Table 115 System Error Logs ............................................................................................. 294
Table 116 Access Control Logs .......................................................................................... 294
Table 117 TCP Reset Logs ................................................................................................ 295
Table 118 Packet Filter Logs .............................................................................................. 295
Table 119 ICMP Logs ......................................................................................................... 296
Table 120 CDR Logs .......................................................................................................... 296
Table 121 PPP Logs ........................................................................................................... 296
Table 122 UPnP Logs ........................................................................................................ 297