ZyXEL Communications P-660H-T Series User Manual
Page 36

P-660H/HW-T Series User’ Guide
35
List of Tables
Table 125 Allowed IP Address Range By Class ................................................................. 377
Table 126 “Natural” Masks ................................................................................................ 377
Table 127 Alternative Subnet Mask Notation ..................................................................... 378
Table 128 Two Subnets Example ....................................................................................... 378
Table 129 Subnet 1 ............................................................................................................ 379
Table 130 Subnet 2 ............................................................................................................ 379
Table 131 Subnet 1 ............................................................................................................ 380
Table 132 Subnet 2 ............................................................................................................ 380
Table 133 Subnet 3 ............................................................................................................ 380
Table 134 Subnet 4 ............................................................................................................ 381
Table 135 Eight Subnets .................................................................................................... 381
Table 136 Class C Subnet Planning ................................................................................... 381
Table 137 Class B Subnet Planning ................................................................................... 382
Table 138 Firewall Commands ........................................................................................... 388
Table 139 NetBIOS Filter Default Settings ......................................................................... 395
Table 140 IEEE 802.11g ..................................................................................................... 408
Table 141 Comparison of EAP Authentication Types ......................................................... 412
Table 142 Wireless Security Relational Matrix ................................................................... 413
Table 143 System Maintenance Logs ................................................................................ 414
Table 144 System Error Logs ............................................................................................. 415
Table 145 Access Control Logs .......................................................................................... 415
Table 146 TCP Reset Logs ................................................................................................ 416
Table 147 Packet Filter Logs .............................................................................................. 416
Table 148 ICMP Logs ......................................................................................................... 417
Table 149 CDR Logs .......................................................................................................... 417
Table 150 PPP Logs ........................................................................................................... 417
Table 151 UPnP Logs ........................................................................................................ 418
Table 152 Content Filtering Logs ....................................................................................... 418
Table 153 Attack Logs ........................................................................................................ 419
Table 154 IPSec Logs ........................................................................................................ 420
Table 155 IKE Logs ............................................................................................................ 420
Table 156 PKI Logs ............................................................................................................ 423
Table 157 Certificate Path Verification Failure Reason Codes ........................................... 424
Table 158 802.1X Logs ...................................................................................................... 425
Table 159 ACL Setting Notes ............................................................................................. 426
Table 160 ICMP Notes ....................................................................................................... 426
Table 161 Syslog Logs ....................................................................................................... 427
Table 162 RFC-2408 ISAKMP Payload Types ................................................................... 427
Table 163 Abbreviations Used in the Example Internal SPTGEN Screens Table .............. 432
Table 164 Menu 1 General Setup (SMT Menu 1) .............................................................. 433
Table 165 Menu 3 (SMT Menu 3 ) ...................................................................................... 433
Table 166 Menu 4 Internet Access Setup (SMT Menu 4) .................................................. 436
Table 167 Menu 12 (SMT Menu 12) ................................................................................... 438