Prestige 660H/HW Series User’s Guide
35
Table 123 Troubleshooting Internet Access ....................................................................... 362
Table 124 Troubleshooting the Password .......................................................................... 362
Table 125 Troubleshooting the Web Configurator .............................................................. 363
Table 126 Troubleshooting Remote Management ............................................................. 363
Table 127 Classes of IP Addresses ................................................................................... 380
Table 128 Allowed IP Address Range By Class ................................................................. 381
Table 129 “Natural” Masks ................................................................................................ 381
Table 130 Alternative Subnet Mask Notation ..................................................................... 382
Table 131 Two Subnets Example ....................................................................................... 382
Table 132 Subnet 1 ............................................................................................................383
Table 133 Subnet 2 ............................................................................................................383
Table 134 Subnet 1 ............................................................................................................384
Table 135 Subnet 2 ............................................................................................................384
Table 136 Subnet 3 ............................................................................................................384
Table 137 Subnet 4 ............................................................................................................385
Table 138 Eight Subnets .................................................................................................... 385
Table 139 Class C Subnet Planning ................................................................................... 385
Table 140 Class B Subnet Planning ................................................................................... 386
Table 141 IEEE802.11g ...................................................................................................... 396
Table 142 Comparison of EAP Authentication Types ......................................................... 401
Table 143 Wireless Security Relational Matrix ................................................................... 403
Table 144 Abbreviations Used in the Example Internal SPTGEN Screens Table .............. 408
Table 145 Menu 1 General Setup (SMT Menu 1) .............................................................. 408
Table 146 Menu 3 (SMT Menu 1) ....................................................................................... 408
Table 147 Menu 4 Internet Access Setup (SMT Menu 4) .................................................. 412
Table 148 Menu 12(SMT Menu 12) .................................................................................... 413
Table 149 Menu 15 SUA Server Setup (SMT Menu 15) .................................................... 417
Table 150 Menu 21.1 Filter Set #1 (SMT Menu 21.1) ........................................................ 419
Table 151 Menu 21.1 Filer Set #2, (SMT Menu 21.1) ....................................................... 423
Table 152 ci command (for annex a): wan adsl opencmd .................................................. 428
Table 153 Sys Firewall Commands .................................................................................... 432
Table 154 Brute-Force Password Guessing Protection Commands .................................. 434
Table 155 System Maintenance Logs ................................................................................ 438
Table 156 System Error Logs ............................................................................................. 439
Table 157 Access Control Logs .......................................................................................... 439
Table 158 TCP Reset Logs ................................................................................................ 440
Table 159 Packet Filter Logs .............................................................................................. 440
Table 160 ICMP Logs ......................................................................................................... 440
Table 161 CDR Logs .......................................................................................................... 441
Table 162 PPP Logs ........................................................................................................... 441
Table 163 UPnP Logs ........................................................................................................ 442
Table 164 Content Filtering Logs ....................................................................................... 442
Table 165 Attack Logs ........................................................................................................ 443