
Do you have a question about the Zoom 5350 and is the answer not in the manual?
| Type | Cable Modem Router |
|---|---|
| DOCSIS | 3.0 |
| Wireless Standard | 802.11n |
| Frequency Band | 2.4 GHz |
| Maximum Wireless Speed | 300 Mbps |
| Ethernet Ports | 4 |
| WAN Port | 1 |
| Antennas | 2 |
| Security | WPA/WPA2 |
Details physical connections and port descriptions of the device, including GE/LAN, USB, RESET, Cable, and AC IN ports.
Guides on establishing wireless connections, including default security settings and WPS setup.
Instructions for connecting additional devices via Ethernet/LAN ports to the cable modem/router.
Step-by-step guide to access the device's web-based management interface for configuration.
Configuration of WPA/WPA2 encryption and Pre-Shared Key (PSK) for robust network security.
Guidance on configuring WEP encryption, an older security standard, for compatible devices.
Procedures to disable wireless security, creating an unsecured network for specific use cases.
Displays current system software version and hardware information of the cable modem/router.
Shows registration process steps and upstream/downstream channel status for network connectivity.
Information on access privileges and options to restore factory default settings.
Provides utilities like Ping and Traceroute for network connectivity troubleshooting.
Displays the SNMP event log for firewall activities and system events.
Configures basic ISP connection settings, LAN IP address, and WAN connection type.
Manages the internal DHCP server for assigning IP addresses to LAN devices.
Sets up Dynamic DNS service for remote access to the network using a host name.
Allows saving current device configuration settings to a PC and restoring them later.
Enables advanced features like WAN blocking, remote management, and multicast.
Filters network traffic by blocking or allowing specific IP address ranges.
Filters network traffic by blocking or allowing specific MAC addresses.
Manages port traffic to block specific Internet services or prevent PCs from sending certain traffic.
Allows incoming Internet requests to reach specific local servers by mapping ports.
Dynamically opens ports for applications based on outgoing traffic detection.
Exposes a device to the Internet for applications not working with port triggers.
Configures RIP parameters for routing information protocol to optimize network routes.
Blocks or permits specific types of web content, Java, ActiveX, and pop-up windows.
Configures firewall event reporting via email alerts and local storage.
Sends firewall attack reports and system events to a remote SysLog server.
Configures rules to block Internet content and websites based on keyword and domain policies.
Sets up individual user accounts with specific access rules, content filtering, and login passwords.
Defines Internet access schedules and blocks based on time of day for specific users.
Tracks access violations and events related to parental control settings for monitoring.
Configures wireless radio frequency, country, 802.11 band, and transmission power.
Configures the main wireless network name (SSID), security mode, and encryption.
Sets up a separate network for temporary visitors with limited access and customizable security.
Adjusts data rates, Wi-Fi thresholds, fragmentation, and RTS thresholds for wireless performance.
Controls which wireless clients are allowed or denied access to the network based on MAC address.
Prioritizes network traffic for multimedia applications to enhance quality of service.
Configures Wireless Distribution System for extending network coverage by bridging access points.
Enables VPN protocols like L2TP, PPTP servers, and IPSec endpoints for secure connections.
Sets up IPSec VPN tunnels with security associations, encryption, authentication, and key management.
Configures L2TP and PPTP server options, PPP security, and user authentication for tunneling.
Displays logs for VPN connection events, tunnel status, and authentication details.
Step-by-step guide for connecting Windows computers with built-in wireless capabilities to the network.
Instructions for connecting devices like iPhones, iPods, and tablets to the wireless network.
Guides for computers requiring a separate wireless adapter installation for network connection.