ZyXEL Communications ZyXEL G-560 Network Router User Manual


 
ZyXEL G-560 User’s Guide
Index G-3
GetNext.............................................................15-2
Manager.....................................................8-6, 15-2
MIBs..........................................................8-7, 15-2
Set.....................................................................15-2
Trap............................................................8-7, 15-2
Traps........................................................15-3, 15-4
Trusted Host......................................................15-3
SNMP Traps............................................................8-7
Subnet Mask..................................3-5, 7-1, 13-2, 17-4
Subnet Masks .........................................................G-2
Subnetting ..............................................................G-3
Supporting Disk......................................................xvii
System
Console Port Speed.......................................17-4
Diagnostic ......................................................17-6
Log and Trace................................................17-5
System Information...........................................17-3
System Status....................................................17-1
Time and Date...................................................19-2
System Information...............................................17-3
System Information & Diagnosis ..........................17-1
System Maintenance..17-1, 17-3, 18-2, 18-4, 18-5, 18-
6, 18-9, 19-1, 19-2, 19-3
System Management Terminal..............................11-4
System Name...........................................................4-2
System Timeout..............................................8-1, 20-3
T
TCP/IP.................................................. 8-2, 17-6, 20-1
Telnet .............................................................8-2, 20-1
Telnet Configuration ......................................8-2, 20-1
Telnet Under NAT.................................................20-1
Temporal Key Integrity Protocol...........................6-11
TFTP
And FTP Over WAN} ......................................20-3
Restrictions .......................................................20-3
TFTP and FTP Over WAN}....................................8-1
TFTP File Transfer................................................18-9
TFTP Restrictions....................................................8-1
Time and Date Setting...........................................19-2
Time Server...........................................................19-3
Time Zone.............................................................19-3
TKIP...................See Temporal Key Integrity Protocol
TLS......................................................................... F-1
Trace Records....................................................... 17-5
Transport Layer Security ................................See TLS
Troubleshooting
Accessing G-560 ....................................... A-2, A-3
Ethernet Port.......................................................A-1
Password ............................................................A-2
Start-Up..............................................................A-1
TTLS....................................................................... F-1
Tunneled Transport Layer Service................See TTLS
U
Upload Firmware.................................................. 18-6
User Authentication.............................................. 6-11
User Profiles................................................ 6-21, 14-1
V
Valid CI Commands ............................................. 19-1
W
Web ........................................................................ 8-4
Web Configurator............................................ 2-1, 2-3
WEP........................................................................ 3-1
WEP Encryption............................................ 6-5, 13-3
Wi-Fi Protected Access .......................................... 1-2
Wireless Client WPA Supplicants ........................ 6-14
Wireless LAN............................................... D-1, 13-2
Benefits ..............................................................D-1
Wireless LAN Setup............................................. 13-2
Wizard Setup .....................................3-1, 3-2, 3-3, 3-4
WLAN............................................ See Wireless LAN
WPA..................................................................... 6-11
WPA with RADIUS Application.......................... 6-12
WPA-PSK............................................................. 6-11
WPA-PSK Application......................................... 6-12
Z
Limited Warranty
Note.......................................................................iv