ZyXEL Communications P-660HW-T v2 User Manual

Page 30

Advertising
background image

P-660HW-T v2 User’s Guide

30

List of Tables

Table 125 Menu 21.1 Filter Set #1 ..................................................................................... 273
Table 126 Menu 21.1 Filer Set #2, ..................................................................................... 275
Table 127 Menu 23 System Menus .................................................................................... 276
Table 128 Menu 24.11 Remote Management Control ........................................................ 277
Table 129 Command Examples ......................................................................................... 278
Table 130 Classes of IP Addresses ................................................................................... 297
Table 131 Allowed IP Address Range By Class ................................................................. 298
Table 132 “Natural” Masks ................................................................................................. 298
Table 133 Alternative Subnet Mask Notation ..................................................................... 299
Table 134 Two Subnets Example ....................................................................................... 300
Table 135 Subnet 1 ............................................................................................................ 300
Table 136 Subnet 2 ............................................................................................................ 300
Table 137 Subnet 1 ............................................................................................................ 301
Table 138 Subnet 2 ............................................................................................................ 301
Table 139 Subnet 3 ............................................................................................................ 302
Table 140 Subnet 4 ............................................................................................................ 302
Table 141 Eight Subnets .................................................................................................... 302
Table 142 Class C Subnet Planning ................................................................................... 303
Table 143 Class B Subnet Planning ................................................................................... 303
Table 144 Firewall Commands ........................................................................................... 309
Table 145 NetBIOS Filter Default Settings ......................................................................... 316
Table 146 IEEE 802.11g ..................................................................................................... 325
Table 147 Wireless Security Levels ................................................................................... 326
Table 148 Comparison of EAP Authentication Types ......................................................... 329
Table 149 Wireless Security Relational Matrix ................................................................... 333

Advertising