List of Tables
P-2802H(W)(L)-I Series User’s Guide
30
Table 125 PPP Logs
............................................................................................................................
297
Table 126 UPnP Logs
..........................................................................................................................
297
Table 127 Content Filtering Logs
.........................................................................................................
297
Table 128 Attack Logs
.........................................................................................................................
297
Table 129 802.1X Logs
........................................................................................................................
298
Table 130 ACL Setting Notes
..............................................................................................................
299
Table 131 ICMP Notes
.........................................................................................................................
299
Table 132 Syslog Logs
........................................................................................................................
300
Table 133 SIP Logs
.............................................................................................................................
300
Table 134 RTP Logs
............................................................................................................................
301
Table 135 FSM Logs: Caller Side
........................................................................................................
301
Table 136 FSM Logs: Callee Side
.......................................................................................................
301
Table 137 PSTN Logs
..........................................................................................................................
301
Table 138 RFC-2408 ISAKMP Payload Types
....................................................................................
302
Table 139 Filename Conventions
........................................................................................................
304
Table 140 Firmware Upgrade
..............................................................................................................
305
Table 141 Restore Configuration
.........................................................................................................
307
Table 142 General Commands for GUI-based FTP Clients
................................................................
310
Table 143 General Commands for GUI-based TFTP Clients
...............................................................
311
Table 144 Diagnostic: General
............................................................................................................
315
Table 145 Diagnostic: DSL Line
..........................................................................................................
316
Table 146 Hardware Specifications
.....................................................................................................
325
Table 147 Firmware Specifications
......................................................................................................
325
Table 148 Voice Features
....................................................................................................................
329
Table 149 Wireless Features
...............................................................................................................
331
Table 150 IEEE 802.11g
......................................................................................................................
331
Table 151 Standards Supported
..........................................................................................................
332
Table 152 P-2802HWL-I Series Power Adaptor Specifications
...........................................................
333
Table 153 Subnet Masks
.....................................................................................................................
356
Table 154 Subnet Masks
.....................................................................................................................
357
Table 155 Maximum Host Numbers
....................................................................................................
357
Table 156 Alternative Subnet Mask Notation
.......................................................................................
357
Table 157 Subnet 1
..............................................................................................................................
359
Table 158 Subnet 2
..............................................................................................................................
360
Table 159 Subnet 3
..............................................................................................................................
360
Table 160 Subnet 4
..............................................................................................................................
360
Table 161 Eight Subnets
......................................................................................................................
360
Table 162 24-bit Network Number Subnet Planning
............................................................................
361
Table 163 16-bit Network Number Subnet Planning
............................................................................
361
Table 164 IEEE 802.11g
......................................................................................................................
367
Table 165 Comparison of EAP Authentication Types
..........................................................................
370
Table 166 Wireless Security Relational Matrix
....................................................................................
371
Table 167 Examples of Services
.........................................................................................................
373