ZyXEL Communications P-661H Series User Manual
Page 32

P-661H/HW Series User’s Guide
32
List of Tables
Table 125 Troubleshooting Accessing the ZyXEL Device .................................................. 295
Table 126 Device ................................................................................................................ 297
Table 127 Firmware ............................................................................................................ 298
Table 128 Classes of IP Addresses ................................................................................... 320
Table 129 Allowed IP Address Range By Class ................................................................. 320
Table 130 “Natural” Masks ................................................................................................ 321
Table 131 Alternative Subnet Mask Notation ..................................................................... 321
Table 132 Two Subnets Example ....................................................................................... 322
Table 133 Subnet 1 ............................................................................................................ 322
Table 134 Subnet 2 ............................................................................................................ 323
Table 135 Subnet 1 ............................................................................................................ 323
Table 136 Subnet 2 ............................................................................................................ 324
Table 137 Subnet 3 ............................................................................................................ 324
Table 138 Subnet 4 ............................................................................................................ 324
Table 139 Eight Subnets .................................................................................................... 325
Table 140 Class C Subnet Planning ................................................................................... 325
Table 141 Class B Subnet Planning ................................................................................... 326
Table 142 Firewall Commands ........................................................................................... 329
Table 143 NetBIOS Filter Default Settings ......................................................................... 336
Table 144 System Maintenance Logs ................................................................................ 339
Table 145 System Error Logs ............................................................................................. 340
Table 146 Access Control Logs .......................................................................................... 340
Table 147 TCP Reset Logs ................................................................................................ 341
Table 148 Packet Filter Logs .............................................................................................. 341
Table 149 ICMP Logs ......................................................................................................... 342
Table 150 CDR Logs .......................................................................................................... 342
Table 151 PPP Logs ........................................................................................................... 342
Table 152 UPnP Logs ........................................................................................................ 343
Table 153 Content Filtering Logs ....................................................................................... 343
Table 154 Attack Logs ........................................................................................................ 344
Table 155 IPSec Logs ........................................................................................................ 345
Table 156 IKE Logs ............................................................................................................ 345
Table 157 PKI Logs ............................................................................................................ 348
Table 158 Certificate Path Verification Failure Reason Codes ........................................... 349
Table 159 802.1X Logs ...................................................................................................... 350
Table 160 ACL Setting Notes ............................................................................................. 351
Table 161 ICMP Notes ....................................................................................................... 351
Table 162 Syslog Logs ....................................................................................................... 352
Table 163 RFC-2408 ISAKMP Payload Types ................................................................... 352
Table 164 IEEE 802.11g ..................................................................................................... 359
Table 165 Wireless Security Levels ................................................................................... 360
Table 166 Comparison of EAP Authentication Types ......................................................... 363
Table 167 Wireless Security Relational Matrix ................................................................... 367