ZyXEL P-336M User’s Guide
List of Tables
14
List of Tables
Table 1 Front Panel LEDs
.....................................................................................
19
Table 2 Web Configurator Screen Sub-Menus
......................................................
21
Table 3 Web Configurator Screen Icons
...............................................................
22
Table 4 Change Password
....................................................................................
23
Table 5 Private IP Address Ranges
......................................................................
25
Table 6 Basic: WAN: Dynamic IP
..........................................................................
26
Table 7 Basic: WAN: Static IP
...............................................................................
28
Table 8 Basic: WAN: PPPoE
.................................................................................
29
Table 9 Basic: LAN
................................................................................................
30
Table 10 Basic: DHCP
...........................................................................................
32
Table 11 Basic: Wireless: Basic WIreless LAN Setup
...........................................
34
Table 12 Basic: Wireless: WLAN Security Setup: WEP
........................................
38
Table 13 Basic: WLAN Security Setup: WPA-Personal
.........................................
39
Table 14 Basic: WLAN Security Setup: WPA-Enterprise
.......................................
40
Table 15 Advanced: Game Hosting
.......................................................................
43
Table 16 Virtual Server: Common Services and Port Numbers
............................
44
Table 17 Advanced: Virtual Server
........................................................................
45
Table 18 Advanced: Applications
..........................................................................
47
Table 19 Advanced: StreamEngine
.......................................................................
50
Table 20 Advanced: Routing
.................................................................................
53
Table 21 Advanced: Access Control
.....................................................................
54
Table 22 Advanced: Web Filter
.............................................................................
56
Table 23 Advanced: MAC Filter
.............................................................................
57
Table 24 Advanced: Firewall
.................................................................................
59
Table 25 Advanced: Inbound Filter
........................................................................
60
Table 26 Advanced: Wireless
................................................................................
63
Table 27 Advanced: Schedule
...............................................................................
64
Table 28 Tools: Admin
...........................................................................................
67
Table 29 Tools: Time
.............................................................................................
71
Table 30 Tools: Syslog
..........................................................................................
73
Table 31 Tools: E-mail
...........................................................................................
74
Table 32 Tools: DDNS
...........................................................................................
77
Table 33 Tools: Admin
...........................................................................................
81
Table 34 Association List
.......................................................................................
82
Table 35 Status: Logs
............................................................................................
83
Table 36 Status: Statistics
.....................................................................................
84
Table 37 Comparison of EAP Authentication Types
..............................................
87
Table 38 Wireless Security Relational Matrix
........................................................
89