beautypg.com

ZyXEL Communications ZyXEL ZyWALL 5 User Manual

Page 41

background image

ZyWALL 5 User’s Guide

40

Table 4 Feature Specifications ........................................................................................... 539
Table 5 Compatible ZyXEL WLAN Cards and Security Features ...................................... 540
Table 6 Console/Dial Backup Port Pin Assignments .......................................................... 542
Table 7 North American AC Power Adaptor Specifications ................................................ 542
Table 8 European Union AC Power Adaptor Specifications ............................................... 543
Table 9 UK AC Power Adaptor Specifications .................................................................... 543
Table 10 Japan AC Power Adaptor Specifications ............................................................. 543
Table 11 Australia and New Zealand AC Power Adaptor Specification .............................. 544
Table 12 Classes of IP Addresses ..................................................................................... 557
Table 13 Allowed IP Address Range By Class ................................................................... 558
Table 14 “Natural” Masks .................................................................................................. 558
Table 15 Alternative Subnet Mask Notation ....................................................................... 559
Table 16 Two Subnets Example ......................................................................................... 559
Table 17 Subnet 1 .............................................................................................................. 560
Table 18 Subnet 2 .............................................................................................................. 560
Table 19 Subnet 1 .............................................................................................................. 561
Table 20 Subnet 2 .............................................................................................................. 561
Table 21 Subnet 3 .............................................................................................................. 561
Table 22 Subnet 4 .............................................................................................................. 562
Table 23 Eight Subnets ...................................................................................................... 562
Table 24 Class C Subnet Planning ..................................................................................... 562
Table 25 Class B Subnet Planning ..................................................................................... 563
Table 26 IEEE802.11g ........................................................................................................ 575
Table 27 Comparison of EAP Authentication Types ........................................................... 581
Table 28 Wireless Security Relational Matrix ..................................................................... 582
Table 29 SIP Call Progression ........................................................................................... 589
Table 30 Firewall Commands ............................................................................................. 621
Table 31 NetBIOS Filter Default Settings ........................................................................... 628
Table 32 Certificates Commands ....................................................................................... 631
Table 33 Brute-Force Password Guessing Protection Commands .................................... 635
Table 34 System Maintenance Logs .................................................................................. 639
Table 35 System Error Logs ............................................................................................... 640
Table 36 Access Control Logs ............................................................................................ 641
Table 37 TCP Reset Logs .................................................................................................. 641
Table 38 Packet Filter Logs ................................................................................................ 642
Table 39 ICMP Logs ........................................................................................................... 642
Table 40 CDR Logs ............................................................................................................ 643
Table 41 PPP Logs ............................................................................................................. 643
Table 42 UPnP Logs .......................................................................................................... 643
Table 43 Content Filtering Logs ......................................................................................... 643
Table 44 Attack Logs .......................................................................................................... 644
Table 45 Remote Management Logs ................................................................................. 645
Table 46 Wireless Logs ...................................................................................................... 646