ZyXEL Communications Wireless Gateway Series manuals
Computer Equipment > Network Router
When we buy new device such as ZyXEL Communications Wireless Gateway Series we often through away most of the documentation but the warranty.
Very often issues with ZyXEL Communications Wireless Gateway Series begin only after the warranty period ends and you may want to find how to repair it or just do some service work.
Even oftener it is hard to remember what does each function in Network Router ZyXEL Communications Wireless Gateway Series is responsible for and what options to choose for expected result.
Fortunately you can find all manuals for Network Router on our side using links below.
ZyXEL Communications Wireless Gateway Series Manual
420 pages 12.23 Mb
1 VersionMay 2 Copyright3 Federal Communications Commission (FCC) Interference Statement4 ZyXEL Limited Warranty5 Customer Support7 Table of Contents16 List of Figures23 List of Tables26 Preface29 Part I:61 Part II:111 Part III:125 Part IV:143 Part V:183 Part VI:207 Part VII:223 Part VIII:255 Part IX:287 Part X:353 Part XI:APPENDICES 355 Problems Starting Up the ZyAIRProblems with the Password 356 Problems with the Ethernet InterfaceProblems with the WAN Interface 357 Problems with Internet AccessProblems with Telnet 358 Problems with the WLAN Interface359 Appendix BBrute-ForcePassword Guessing ProtectionChart B-1 Brute-ForcePassword Guessing Protection Commands Brute-ForcePassword Guessing Protection B-1 361 Windows 95/98/Me364 Windows 2000/NT/XP368 Macintosh OS 8/9370 Macintosh OS373 Benefits of a Wireless LAN374 Ad-hocWireless LAN ConfigurationInfrastructure Wireless LAN Configuration 377 Security Flaws with IEEEDeployment Issues with IEEE Advantages of the IEEE 379 EAP-MD5 (Message-DigestAlgorithm 5)EAP-TLS(Transport Layer Security) EAP-TTLS(Tunneled Transport Layer Service) PEAP (Protected EAP) 381 Antenna CharacteristicsFrequency Radiation Pattern Antenna Gain Types of Antennas For WLAN 382 Positioning AntennasConnector Type 383 PPPoE in ActionBenefits of PPPoE Traditional Dial-upScenario 384 How PPPoE WorksZyAIR as a PPPoE Client 385 What is PPTPPPTP and the ZyAIR 386 PPTP Protocol OverviewControl & PPP connections Call Connection 387 PPP Data Connection389 IP AddressingIP Classes 390 Subnet MasksSubnetting 391 Example: Two Subnets393 Example: Four Subnets394 Example Eight Subnets395 Subnetting With Class A and Class B Networks397 Command SyntaxCommand Usage 399 IntroductionDisplay NetBIOS Filter Settings 400 NetBIOS Filter Configuration401 Appendix MBoot Commands 403 The Ideal SetupThe “Triangle Route” Problem 404 The “Triangle Route” SolutionsIP Aliasing 405 Gateways on the WAN Side407 Appendix OLog Descriptions 413 Appendix PPower Adaptor SpecificationsPower Adaptor Specifications P-1 414 P-23-11 D-2 Alternative Subnet Mask Notation .................. J-3 Antenna G-2 G-1 21-3 Backup 16-11 M-1 Brute-force Attack,........................................11-5 See Basic Service Set F-1 Call Filters 415 Appendix QIndex29-3 Maximum Number of Schedule Sets Precedence Example See CA Channel ID 6-7 J-1 C-1 Conditions that prevent TFTP and FTP from Configuration 5-2 21-6 DHCP.....1-5, 3-3, 3-12, 4-3, 5-2, 5-4, 16-4 D-3 Index Q-1 416 13-103-3, 3-12, 9-6 DoS Basics Types DoS (Denial of Service) 1-4 See Distribution System See Direct Sequence Spread Spectrum Dynamic DNS 1-4, 4-2, 4-3, 18-1 DYNDNS Wildcard 4-3 20-1, 20-2 H-1 Error/Information Messages See Extended Service Set. See Extended Service Set 3-5 D-3 FHSS..See Frequency-HoppingSpread Spectrum Filter Rules Summary Filter Set Filtering 24-1 Firmware File Maintenance 16-8 Q-2 417 Frequency-HoppingSpread Spectrum...........D-2 4-2, 5-2, 9-6, 13-1, 13-4 Restrictions 13-1 3-2, 4-1 4-6 9-6, 11-1, 11-3 28-6 IBSS See Independent Basic Service Set D-1 E-1 E-1 Independent Basic Service Set D-2, 6-1 Internet Access 1-5, 17-6, 20-1 A-2 21-9, 24-8, 27-4 IP Pool 5-4 IP Spoofing 11-4 LAN IP Address 15-8 LAND O-1 Logging Option 24-8 MAC Address MAC Address Filter Action 7-8 MAC Address Filtering 7-6 Q-3 418 Management Information Base (MIB)See NAT Many to One Message Digest Algorithm 5 See MD5 MD5 8-7, 10-4, 21-6 MIC See Message Integrity Check 5-3, 5-5 NAT 3-10, 3-12, 9-6, 9-7, 9-8 Non NAT Friendly Application Programs 14-1, 14-2 1-6 Network Topology With RADIUS Server E-2 One to One Password 4-5, 17-2, 21-3 Point-to-PointTunneling Protocol ... 3-7, 9-7. See 9-6 PPPoE 3-5, 3-9 I-1, 3-5, 3-7, 3-10 10-4, 21-6 xxvi Rate Remote Authentication Dial In User Service..See RADIUS 30-1 21-1 Q-4 419 Remote Node Profile5-2, 19-3 Roaming 6-3 12-1 Schedule Sets Server .4-8, 9-5, 23-2, 23-4, 23-6, 23-7, 23-8,23 9, 23-11 iv 11-5 9-7, 12-3 Stateful Inspection 1-4, 11-1, 11-2, 11-7, 11-8 SUA 9-6, 9-7 Subnet Mask..... 3-12, 5-5, 19-3, 21-5, 21-9 J-2 J-3 SYN Flood System 27-1, 27-3, 28-2, 28-5,28 13, 28-14, 29-1, 29-2, 29-3 13-2 TCP/IP... 5-5, 11-3, 11-4, 13-2, 24-12, 27-8 Telnet Configuration TFTP Q-5 420 TFTP and FTP over WAN Will Not WorkWhen… TFTP Restrictions TKIP See Temporal Key Integrity Protocol Transport Layer Security See TLS N-1 N-2 Trigger Port Forwarding Troubleshooting Accessing ZyAIR A-3, A-4 Tunneled Transport Layer Service See TTLS TTLS Universal Plug and Play (UPnP) 14-1 UNIX Syslog 27-5 User Name 4-5 User Profiles 7-19 Web Configurator 2-1, 2-4, 11-2 7-5 Wireless Client WPA Supplicants D-1 Wizard Setup 3-1, 3-2, 3-5 WLAN See Wireless LAN 28-1 ZyXEL Limited Warranty ZyXEL’s Firewall Q-6
Also you can find more ZyXEL Communications manuals or manuals for other Computer Equipment.