beautypg.com

ZyXEL Communications 5 Series User Manual

Page 51

background image

ZyWALL 5/35/70 Series User’s Guide

List of Tables

51

Table 254 Menu 25: Sample IP Routing Policy Summary .................................................. 691

Table 255 IP Routing Policy Setup ..................................................................................... 692

Table 256 Menu 25.1: IP Routing Policy Setup .................................................................. 693

Table 257 Menu 25.1.1: IP Routing Policy Setup ............................................................... 695

Table 258 Schedule Set Setup ........................................................................................... 700

Table 259 Troubleshooting the Start-Up of Your ZyWALL .................................................. 703

Table 260 Troubleshooting the LAN Interface .................................................................... 703

Table 261 Troubleshooting the DMZ Interface ................................................................... 704

Table 262 Troubleshooting the WAN Interface ................................................................... 704

Table 263 Troubleshooting Accessing the ZyWALL ........................................................... 705

Table 264 Device Specifications ......................................................................................... 715

Table 265 Performance ...................................................................................................... 716

Table 266 Firmware Features ............................................................................................ 716

Table 267 Feature Specifications ....................................................................................... 718

Table 268 Compatible ZyXEL WLAN Cards and Security Features .................................. 719

Table 269 Console/Dial Backup Port Pin Assignments ...................................................... 721

Table 270 Classes of IP Addresses ................................................................................... 746

Table 271 Allowed IP Address Range By Class ................................................................. 746

Table 272 “Natural” Masks ................................................................................................ 747

Table 273 Alternative Subnet Mask Notation ..................................................................... 747

Table 274 Two Subnets Example ....................................................................................... 748

Table 275 Subnet 1 ............................................................................................................ 748

Table 276 Subnet 2 ............................................................................................................ 749

Table 277 Subnet 1 ............................................................................................................ 749

Table 278 Subnet 2 ............................................................................................................ 750

Table 279 Subnet 3 ............................................................................................................ 750

Table 280 Subnet 4 ............................................................................................................ 750

Table 281 Eight Subnets .................................................................................................... 751

Table 282 Class C Subnet Planning ................................................................................... 751

Table 283 Class B Subnet Planning ................................................................................... 752

Table 284 Commonly Used Services ................................................................................. 753

Table 285 IEEE802.11g ...................................................................................................... 761

Table 286 Comparison of EAP Authentication Types ......................................................... 767

Table 287 Wireless Security Relational Matrix ................................................................... 768

Table 288 Firewall Commands ........................................................................................... 807

Table 289 NetBIOS Filter Default Settings ......................................................................... 814

Table 290 Certificates Commands ..................................................................................... 817

Table 291 Brute-Force Password Guessing Protection Commands .................................. 821