ZyXEL Communications P-661HW User Manual

Page of 383
P-661H/HW Series User’s Guide
32
List of Tables
Table 125 Troubleshooting Accessing the ZyXEL Device  .................................................. 295
Table 126 Device  ................................................................................................................ 297
Table 127 Firmware  ............................................................................................................ 298
Table 128 Classes of IP Addresses   ................................................................................... 319
Table 129 Allowed IP Address Range By Class  ................................................................. 320
Table 130 “Natural” Masks   ................................................................................................. 320
Table 131 Alternative Subnet Mask Notation   ..................................................................... 321
Table 132 Two Subnets Example  ....................................................................................... 321
Table 133 Subnet 1   ............................................................................................................ 322
Table 134 Subnet 2   ............................................................................................................ 322
Table 135 Subnet 1   ............................................................................................................ 323
Table 136 Subnet 2   ............................................................................................................ 323
Table 137 Subnet 3   ............................................................................................................ 323
Table 138 Subnet 4   ............................................................................................................ 324
Table 139 Eight Subnets   .................................................................................................... 324
Table 140 Class C Subnet Planning  ................................................................................... 324
Table 141 Class B Subnet Planning  ................................................................................... 325
Table 142 Firewall Commands  ........................................................................................... 329
Table 143 NetBIOS Filter Default Settings   ......................................................................... 336
Table 144 System Maintenance Logs   ................................................................................ 339
Table 145 System Error Logs  ............................................................................................. 340
Table 146 Access Control Logs  .......................................................................................... 340
Table 147 TCP Reset Logs   ................................................................................................ 341
Table 148 Packet Filter Logs  .............................................................................................. 341
Table 149 ICMP Logs  ......................................................................................................... 342
Table 150 CDR Logs   .......................................................................................................... 342
Table 151 PPP Logs  ........................................................................................................... 342
Table 152 UPnP Logs   ........................................................................................................ 343
Table 153 Content Filtering Logs   ....................................................................................... 343
Table 154 Attack Logs  ........................................................................................................ 344
Table 155 IPSec Logs   ........................................................................................................ 345
Table 156 IKE Logs   ............................................................................................................ 345
Table 157 PKI Logs   ............................................................................................................ 348
Table 158 Certificate Path Verification Failure Reason Codes  ........................................... 349
Table 159 802.1X Logs   ...................................................................................................... 350
Table 160 ACL Setting Notes   ............................................................................................. 351
Table 161 ICMP Notes   ....................................................................................................... 351
Table 162 Syslog Logs   ....................................................................................................... 352
Table 163 RFC-2408 ISAKMP Payload Types  ................................................................... 352
Table 164 IEEE 802.11g  ..................................................................................................... 359
Table 165 Wireless Security Levels   ................................................................................... 360
Table 166 Comparison of EAP Authentication Types  ......................................................... 363
Table 167 Wireless Security Relational Matrix  ................................................................... 367