ZyXEL Communications 100 Series Network Router User Manual


 
List of Tables
ZyWALL USG 100/200 Series User’s Guide
50
Table 297 Device HA Logs .................................................................................................................. 797
Table 298 Routing Protocol Logs ......................................................................................................... 799
Table 299 NAT Logs ............................................................................................................................ 802
Table 300 PKI Logs ............................................................................................................................. 803
Table 301 Interface Logs ..................................................................................................................... 805
Table 302 WLAN Logs ......................................................................................................................... 809
Table 303 Account Logs .......................................................................................................................811
Table 304 Port Grouping Logs ..............................................................................................................811
Table 305 Force Authentication Logs ...................................................................................................811
Table 306 File Manager Logs .............................................................................................................. 812
Table 307 E-mail Daily Report Logs .................................................................................................... 812
Table 308 Commonly Used Services ................................................................................................... 815
Table 309 IEEE 802.11g ...................................................................................................................... 835
Table 310 Wireless Security Levels ..................................................................................................... 836
Table 311 Comparison of EAP Authentication Types .......................................................................... 839
Table 312 Wireless Security Relational Matrix .................................................................................... 842