ZyXEL Communications ZyXEL ZyWALL 2WG User Manual
Page 47
List of Tables
ZyWALL 2WG User’s Guide
47
Table 254 Allowed IP Address Range By Class .................................................................................. 664
Table 255 “Natural” Masks .................................................................................................................. 665
Table 256 Alternative Subnet Mask Notation ....................................................................................... 665
Table 257 Two Subnets Example ........................................................................................................ 666
Table 258 Subnet 1 .............................................................................................................................. 666
Table 259 Subnet 2 .............................................................................................................................. 666
Table 260 Subnet 1 .............................................................................................................................. 667
Table 261 Subnet 2 .............................................................................................................................. 667
Table 262 Subnet 3 .............................................................................................................................. 668
Table 263 Subnet 4 .............................................................................................................................. 668
Table 264 Eight Subnets ...................................................................................................................... 668
Table 265 Class C Subnet Planning .................................................................................................... 668
Table 266 Class B Subnet Planning .................................................................................................... 669
Table 267 Commonly Used Services ................................................................................................... 671
Table 268 IEEE 802.11g ...................................................................................................................... 679
Table 269 Wireless Security Levels ..................................................................................................... 680
Table 270 Comparison of EAP Authentication Types .......................................................................... 683
Table 271 Wireless Security Relational Matrix .................................................................................... 686
Table 272 NetBIOS Filter Default Settings .......................................................................................... 710
Table 273 Brute-Force Password Guessing Protection Commands ....................................................711