ZyXEL Communications ZyWALL5UTM 4.0 Network Router User Manual


 
ZyWALL 5/35/70 Series User’s Guide
List of Tables 46
Table 254 Classes of IP Addresses ................................................................................... 690
Table 255 Allowed IP Address Range By Class ................................................................. 691
Table 256 “Natural” Masks ................................................................................................ 691
Table 257 Alternative Subnet Mask Notation ..................................................................... 692
Table 258 Two Subnets Example ....................................................................................... 692
Table 259 Subnet 1 ............................................................................................................693
Table 260 Subnet 2 ............................................................................................................693
Table 261 Subnet 1 ............................................................................................................694
Table 262 Subnet 2 ............................................................................................................694
Table 263 Subnet 3 ............................................................................................................694
Table 264 Subnet 4 ............................................................................................................695
Table 265 Eight Subnets .................................................................................................... 695
Table 266 Class C Subnet Planning ................................................................................... 695
Table 267 Class B Subnet Planning ................................................................................... 696
Table 268 IEEE802.11g ...................................................................................................... 708
Table 269 Comparison of EAP Authentication Types ......................................................... 714
Table 270 Wireless Security Relational Matrix ................................................................... 715
Table 271 Firewall Commands ........................................................................................... 752
Table 272 NetBIOS Filter Default Settings ......................................................................... 759
Table 273 Certificates Commands ..................................................................................... 762
Table 274 Brute-Force Password Guessing Protection Commands .................................. 766
Table 275 System Maintenance Logs ................................................................................ 770
Table 276 System Error Logs ............................................................................................. 771
Table 277 Access Control Logs .......................................................................................... 772
Table 278 TCP Reset Logs ................................................................................................ 773
Table 279 Packet Filter Logs .............................................................................................. 773
Table 280 ICMP Logs ......................................................................................................... 774
Table 281 CDR Logs .......................................................................................................... 774
Table 282 PPP Logs ........................................................................................................... 774
Table 283 UPnP Logs ........................................................................................................ 775
Table 284 Content Filtering Logs ....................................................................................... 775
Table 285 Attack Logs ........................................................................................................ 776
Table 286 Remote Management Logs ............................................................................... 777
Table 287 Wireless Logs .................................................................................................... 778
Table 288 IPSec Logs ........................................................................................................ 778
Table 289 IKE Logs ............................................................................................................779
Table 290 PKI Logs ............................................................................................................782
Table 291 Certificate Path Verification Failure Reason Codes ........................................... 783
Table 292 802.1X Logs ...................................................................................................... 783
Table 293 ACL Setting Notes ............................................................................................. 784
Table 294 ICMP Notes ....................................................................................................... 785
Table 295 IDP Logs ............................................................................................................786
Table 296 AV Logs .............................................................................................................787