ZyXEL Prestige 660HW-D1 Wireless Router 91-004-593003B Manuel D’Utilisation
Codes de produits
91-004-593003B
P-660H/HW-D Series User’s Guide
31
List of Tables
Table 125 Eight Subnets .................................................................................................... 296
Table 126 Class C Subnet Planning ................................................................................... 296
Table 127 Class B Subnet Planning ................................................................................... 297
Table 128 Firewall Commands ........................................................................................... 300
Table 129 NetBIOS Filter Default Settings ......................................................................... 307
Table 130 System Maintenance Logs ................................................................................ 312
Table 131 System Error Logs ............................................................................................. 313
Table 132 Access Control Logs .......................................................................................... 313
Table 133 TCP Reset Logs ................................................................................................ 314
Table 134 Packet Filter Logs .............................................................................................. 314
Table 135 ICMP Logs ......................................................................................................... 315
Table 136 CDR Logs .......................................................................................................... 315
Table 137 PPP Logs ........................................................................................................... 315
Table 138 UPnP Logs ........................................................................................................ 316
Table 139 Content Filtering Logs ....................................................................................... 316
Table 140 Attack Logs ........................................................................................................ 317
Table 141 IPSec Logs ........................................................................................................ 318
Table 142 IKE Logs ............................................................................................................ 318
Table 143 PKI Logs ............................................................................................................ 321
Table 144 Certificate Path Verification Failure Reason Codes ........................................... 322
Table 145 802.1X Logs ...................................................................................................... 323
Table 146 ACL Setting Notes ............................................................................................. 324
Table 147 ICMP Notes ....................................................................................................... 324
Table 148 Syslog Logs ....................................................................................................... 325
Table 149 RFC-2408 ISAKMP Payload Types ................................................................... 325
Table 150 IEEE 802.11g ..................................................................................................... 332
Table 151 Wireless Security Levels ................................................................................... 333
Table 152 Comparison of EAP Authentication Types ......................................................... 336
Table 153 Wireless Security Relational Matrix ................................................................... 340
Table 126 Class C Subnet Planning ................................................................................... 296
Table 127 Class B Subnet Planning ................................................................................... 297
Table 128 Firewall Commands ........................................................................................... 300
Table 129 NetBIOS Filter Default Settings ......................................................................... 307
Table 130 System Maintenance Logs ................................................................................ 312
Table 131 System Error Logs ............................................................................................. 313
Table 132 Access Control Logs .......................................................................................... 313
Table 133 TCP Reset Logs ................................................................................................ 314
Table 134 Packet Filter Logs .............................................................................................. 314
Table 135 ICMP Logs ......................................................................................................... 315
Table 136 CDR Logs .......................................................................................................... 315
Table 137 PPP Logs ........................................................................................................... 315
Table 138 UPnP Logs ........................................................................................................ 316
Table 139 Content Filtering Logs ....................................................................................... 316
Table 140 Attack Logs ........................................................................................................ 317
Table 141 IPSec Logs ........................................................................................................ 318
Table 142 IKE Logs ............................................................................................................ 318
Table 143 PKI Logs ............................................................................................................ 321
Table 144 Certificate Path Verification Failure Reason Codes ........................................... 322
Table 145 802.1X Logs ...................................................................................................... 323
Table 146 ACL Setting Notes ............................................................................................. 324
Table 147 ICMP Notes ....................................................................................................... 324
Table 148 Syslog Logs ....................................................................................................... 325
Table 149 RFC-2408 ISAKMP Payload Types ................................................................... 325
Table 150 IEEE 802.11g ..................................................................................................... 332
Table 151 Wireless Security Levels ................................................................................... 333
Table 152 Comparison of EAP Authentication Types ......................................................... 336
Table 153 Wireless Security Relational Matrix ................................................................... 340