beautypg.com

ZyXEL Communications NBG-318S User Manual

Page 25

background image

List of Tables

NBG-318S User’s Guide

25

Table 82 Content Filtering Logs ........................................................................................................... 192
Table 83 Attack Logs ........................................................................................................................... 193
Table 84 PKI Logs ............................................................................................................................... 194
Table 85 802.1X Logs .......................................................................................................................... 195
Table 86 ACL Setting Notes ................................................................................................................ 196
Table 87 ICMP Notes ........................................................................................................................... 196
Table 88 Syslog Logs .......................................................................................................................... 197
Table 89 RFC-2408 ISAKMP Payload Types ...................................................................................... 197
Table 90 Maintenance > Tools > Firmware .......................................................................................... 199
Table 91 Maintenance Restore Configuration ..................................................................................... 201
Table 92 Maintenance > Config Mode > General ............................................................................... 205
Table 93 Advanced Configuration Options ......................................................................................... 206
Table 94 Maintenance > Sys OP Mode > General ............................................................................. 208
Table 95 Hardware Features ............................................................................................................... 219
Table 96 Firmware Features ................................................................................................................ 220
Table 97 Standards Supported ............................................................................................................ 221
Table 98 Subnet Mask - Identifying Network Number ......................................................................... 232
Table 99 Subnet Masks ....................................................................................................................... 233
Table 100 Maximum Host Numbers .................................................................................................... 233
Table 101 Alternative Subnet Mask Notation ....................................................................................... 233
Table 102 Subnet 1 .............................................................................................................................. 235
Table 103 Subnet 2 .............................................................................................................................. 236
Table 104 Subnet 3 .............................................................................................................................. 236
Table 105 Subnet 4 .............................................................................................................................. 236
Table 106 Eight Subnets ...................................................................................................................... 236
Table 107 24-bit Network Number Subnet Planning ............................................................................ 237
Table 108 16-bit Network Number Subnet Planning ............................................................................ 237
Table 109 IEEE 802.11g ...................................................................................................................... 259
Table 110 Comparison of EAP Authentication Types .......................................................................... 262
Table 111 Wireless Security Relational Matrix ..................................................................................... 265
Table 112 Examples of Services .......................................................................................................... 267