ZyXEL Communications 35 Series Network Router User Manual


 
ZyWALL 5/35/70 Series User’s Guide
List of Tables 50
Table 254 Classes of IP Addresses ................................................................................... 694
Table 255 Allowed IP Address Range By Class ................................................................. 695
Table 256 “Natural” Masks ................................................................................................ 695
Table 257 Alternative Subnet Mask Notation ..................................................................... 696
Table 258 Two Subnets Example ....................................................................................... 696
Table 259 Subnet 1 ............................................................................................................697
Table 260 Subnet 2 ............................................................................................................697
Table 261 Subnet 1 ............................................................................................................698
Table 262 Subnet 2 ............................................................................................................698
Table 263 Subnet 3 ............................................................................................................698
Table 264 Subnet 4 ............................................................................................................699
Table 265 Eight Subnets .................................................................................................... 699
Table 266 Class C Subnet Planning ................................................................................... 699
Table 267 Class B Subnet Planning ................................................................................... 700
Table 268 IEEE802.11g ...................................................................................................... 712
Table 269 Comparison of EAP Authentication Types ......................................................... 718
Table 270 Wireless Security Relational Matrix ................................................................... 719
Table 271 Firewall Commands ........................................................................................... 756
Table 272 NetBIOS Filter Default Settings ......................................................................... 763
Table 273 Certificates Commands ..................................................................................... 766
Table 274 Brute-Force Password Guessing Protection Commands .................................. 770
Table 275 System Maintenance Logs ................................................................................ 774
Table 276 System Error Logs ............................................................................................. 775
Table 277 Access Control Logs .......................................................................................... 776
Table 278 TCP Reset Logs ................................................................................................ 777
Table 279 Packet Filter Logs .............................................................................................. 777
Table 280 ICMP Logs ......................................................................................................... 778
Table 281 CDR Logs .......................................................................................................... 778
Table 282 PPP Logs ........................................................................................................... 778
Table 283 UPnP Logs ........................................................................................................ 779
Table 284 Content Filtering Logs ....................................................................................... 779
Table 285 Attack Logs ........................................................................................................ 780
Table 286 Remote Management Logs ............................................................................... 781
Table 287 Wireless Logs .................................................................................................... 782
Table 288 IPSec Logs ........................................................................................................ 782
Table 289 IKE Logs ............................................................................................................783
Table 290 PKI Logs ............................................................................................................786
Table 291 Certificate Path Verification Failure Reason Codes ........................................... 787
Table 292 802.1X Logs ...................................................................................................... 787
Table 293 ACL Setting Notes ............................................................................................. 788
Table 294 ICMP Notes ....................................................................................................... 789
Table 295 IDP Logs ............................................................................................................790
Table 296 AV Logs .............................................................................................................791