ZyXEL Communications PLA450 Network Hardware User Manual


 
List of Tables
PLA450 User’s Guide
20
Table 39 Subnet Mask - Identifying Network Number ......................................................................... 136
Table 40 Subnet Masks ....................................................................................................................... 137
Table 41 Maximum Host Numbers ...................................................................................................... 137
Table 42 Alternative Subnet Mask Notation ......................................................................................... 137
Table 43 Subnet 1 ................................................................................................................................ 139
Table 44 Subnet 2 ................................................................................................................................ 140
Table 45 Subnet 3 ................................................................................................................................ 140
Table 46 Subnet 4 ................................................................................................................................ 140
Table 47 Eight Subnets ........................................................................................................................ 140
Table 48 24-bit Network Number Subnet Planning .............................................................................. 141
Table 49 16-bit Network Number Subnet Planning .............................................................................. 141
Table 50 IEEE 802.11g ........................................................................................................................ 163
Table 51 Wireless Security Levels ....................................................................................................... 164
Table 52 Comparison of EAP Authentication Types ............................................................................ 167
Table 53 Wireless Security Relational Matrix ...................................................................................... 170
Table 54 Commonly Used Services ..................................................................................................... 173