P-2602H(W)(L)-DxA Series User’s Guide
32
List of Tables
Table 125 Troubleshooting Starting Up Your Device
..........................................................
319
Table 126 Troubleshooting the LAN
...................................................................................
319
Table 127 Troubleshooting the WAN
..................................................................................
320
Table 128 Troubleshooting Accessing Your Device
...........................................................
321
Table 129 Troubleshooting Telephone
...............................................................................
329
Table 130 Device Specifications
.........................................................................................
333
Table 131 Firmware Specifications
.....................................................................................
334
Table 132 P-2602HWL Series Power Adaptor Specifications
............................................
336
Table 133 Classes of IP Addresses
...................................................................................
354
Table 134 Allowed IP Address Range By Class
.................................................................
354
Table 135
“Natural” Masks
................................................................................................
355
Table 136 Alternative Subnet Mask Notation
.....................................................................
355
Table 137 Two Subnets Example
.......................................................................................
356
Table 138 Subnet 1
............................................................................................................
356
Table 139 Subnet 2
............................................................................................................
357
Table 140 Subnet 1
............................................................................................................
357
Table 141 Subnet 2
............................................................................................................
358
Table 142 Subnet 3
............................................................................................................
358
Table 143 Subnet 4
............................................................................................................
358
Table 144 Eight Subnets
....................................................................................................
359
Table 145 Class C Subnet Planning
...................................................................................
359
Table 146 Class B Subnet Planning
...................................................................................
360
Table 147 IEEE 802.11g
.....................................................................................................
365
Table 148 Comparison of EAP Authentication Types
.........................................................
369
Table 149 Wireless Security Relational Matrix
...................................................................
370
Table 150 Examples of Services
........................................................................................
371
Table 151 Sys Firewall Commands
....................................................................................
375
Table 152 System Maintenance Logs
................................................................................
381
Table 153 System Error Logs
.............................................................................................
382
Table 154 Access Control Logs
..........................................................................................
382
Table 155 TCP Reset Logs
................................................................................................
383
Table 156 Packet Filter Logs
..............................................................................................
383
Table 157 ICMP Logs
.........................................................................................................
383
Table 158 CDR Logs
..........................................................................................................
384
Table 159 PPP Logs
...........................................................................................................
384
Table 160 UPnP Logs
........................................................................................................
385
Table 161 Content Filtering Logs
.......................................................................................
385
Table 162 Attack Logs
........................................................................................................
385
Table 163 802.1X Logs
......................................................................................................
386
Table 164 ACL Setting Notes
.............................................................................................
387
Table 165 ICMP Notes
.......................................................................................................
387
Table 166 Syslog Logs
.......................................................................................................
388
Table 167 SIP Logs
............................................................................................................
388